Dokumen - Pub Is 95 Cdma and Cdma2000 Cellular Pcs Systems Implementation 0130871125 9780130871121
Dokumen - Pub Is 95 Cdma and Cdma2000 Cellular Pcs Systems Implementation 0130871125 9780130871121
LIBERTI & RAPPAPORT Smart Antennas for Wireless Communications: IS-95 and Third
Generation CDMA Applications
RAZAVI RF Microelectronics
FORTHCOMING
POOR & WANG Wireless Communication Systems: Advanced Techniques for Signal Reception
Prentice Hall books are widely used by corporations and government agencies for
training, marketing, and resale.
The publisher offers discounts on this book when ordered in bulk quantities.
For more information, contact:
Corporate Sales Department
Prentice Hall PTR
One Lake Street
Upper Saddle River, NJ 07458
Phone: 800-382-3419 Fax: 201-236-7141
E-mail: [email protected].
All rights reserved. No part of this book may be reproduced, in any form
or by any means, without permission in writing from the publisher.
All product names mentioned herein are the trademarks of their respective owners.
10 9 8 7 6 5 4 3 2 1
ISBN: 0-13-087112-5
Preface xvii
1.1 Introduction 1
1.2 Major Attributes of CDMA Systems 2
1.3 Third-Generation Systems 3
1.4 Multiple Access Technologies 5
1.5 Modes of Operation in Wireless Communications 7
1.6 Summary 8
1.7 References 8
2.1 Introduction 9
2.2 Types of Techniques Used for Spread Spectrum 9
2.3 The Concept of Spread Spectrum System 11
2.3.1 System Processing Gain 12
2.4 The Performance of DSSS 14
2.4.1 The DSSS System 14
2.4.2 Coherent Binary Phase-Shift Keying 14
2.4.3 Quadrature Phase-Shift Keying 15
vii
viii Contents
3.1 Introduction 41
3.2 Speech Coding 41
3.2.1 Pulse Code Modulation 41
3.2.2 Adaptive Pulse Code Modulation 43
3.2.3 Code-Excited Linear Prediction 45
3.2.4 Enhanced Variable-Rate Codec 49
3.3 Channel Coding 50
3.3.1 Convolutional Code 52
3.4 Summary 54
3.5 Problems 54
3.6 References 55
4.1 Introduction 57
4.2 Diversity Reception 57
4.3 Types of Diversity 58
4.3.1 Macroscopic Diversity 58
4.3.2 Microscopic Diversity 59
4.3.3 RAKE Receiver 60
4.4 Basic Combining Methods 63
4.4.1 Selection Combiner 63
4.4.2 Maximal-Ratio Combiner 65
4.4.3 Equal-Gain Combining 67
Contents ix
5.1 Introduction 79
5.2 TR-45/TR-46 Reference Model 79
5.3 Functional Model Based on Reference Model 83
5.4 Wireless Intelligent Network 85
5.5 Summary 89
5.6 References 89
6.1 Introduction 91
6.2 TIA IS-95 CDMA System 91
6.2.1 Forward Link 93
6.2.2 Reverse Link 96
6.3 Summary 100
6.4 References 101
B Abbreviations 403
Index 417
The global mobile communications market is booming. There are almost 250 million users
worldwide and should be nearly 1 billion by early next century. Code Division Multiple Access
(CDMA) is the fastest-growing digital wireless technology, tripling its worldwide subscriber
base between 1997 and 1998. There are already 30 million CDMA customers and, at the current
growth rate, there will be 50 million by the millennium. The major markets for CDMA are North
America, Latin America, and Asia (particularly Japan and Korea). In total, CDMA has been
adopted by almost 50 countries around the world.
It is not hard to see the reasons for the success of CDMA. CDMA is an advanced digital
technology that can offer about 7 to10 times the capacity of analog technologies and up to 6
times the capacity of digital technologies such as Time Division Multiple Access (TDMA). The
speech quality provided by CDMA systems is far superior to any other digital cellular technol-
ogy, particularly in difficult radio environments such as dense urban areas and mountainous
regions. In both initial deployment and long-term operation, CDMA provides the most cost-
effective solution for cellular operators. After an 18-month of market rollout, Personal Commu-
nications Services (PCS) providers have adequately demonstrated the power of CDMA technol-
ogy to support a marketing strategy based on low prices and superior performance in key areas
such as voice quality, system reliability, and handset battery life.
CDMA service providers have a strong advantage when pursuing the market to the min-
utes-of-use model, given the longevity of CDMA handset battery life and the higher quality of
the voice signal. A recent analysis of wireless platform performance by the Telecommunications
Research and Action Center (TRAC) found that CDMA outperformed other digital and analog
technologies on every front, including signal quality, security, power consumption, and reliabil-
ity. Although analog technology came out ahead in availability, all three digital services (GSM,
IS-136 TDMA, and IS-95 CDMA) were rated equally over analog with respect to availability of
xvii
xviii Preface
enhanced service features. The TRAC study found CDMA to be superior in signal security and
voice quality over the other digital air interface standards. According to TRAC, CDMA has sev-
eral advantages for consumers. Lower power consumption enables CDMA handsets to support
up to 4 hours of talk time or 48 hours of standby time on a single battery charge. It has also been
found that the soft-handoff characteristics of CDMA lead to fewer dropped calls than with GSM
and IS-136 TDMA. One possible drawback for some CDMA customers is that there are some
limitations on roaming capabilities. Some PCS operators with cellular affiliates are supporting
dual-mode handsets to allow roaming between CDMA and analog platforms.
CDMA technology is constantly evolving to offer customers new, advanced services. The
mobile data speeds offered through CDMA phones are increasing, and new voice codecs pro-
vide speech quality close to wireline. Internet access is now available through CDMA terminals.
The time will soon be at hand when CDMA service providers can further exploit the enhanced
service potential of their platforms. There has been much talk of so-called third-generation (3G)
data capabilities, where PCS providers will be able to compete with wireline service providers at
high access speeds. PCS providers are looking ahead toward providing a range of service cate-
gories such as Internet and intranet access, multimedia applications, high-speed business trans-
actions, and telemetry. The CDMA network offers operators a smooth evolutionary path to 3G
mobile systems.
The IS-95B standard is quite flexible, enabling service providers to allocate data in incre-
ments of 8 kilobits per second (kbps) within the 1.25-megahertz (MHz) CDMA channel band-
width based on how service providers configure software download to already-installed network
controllers. This means operators can implement return data speeds at rates much lower than 64
kbps, ensuring much lower power consumption in handsets than would be the case at a full 64-
kbps return rate. While operators in GSM and IS-136 TDMA sectors are making efforts to
ensure they won’t be left behind as data becomes a factor, CDMA appears to have a clear edge in
its ability to go to relatively high speeds over the existing infrastructure.
The opportunity to use the CDMA platform to add a fixed wireless service feature repre-
sents an added advantage for operators. Because CDMA has ample spectrum to provide a fixed
service on top of mobile, several operators are exploring using terminals that would be able to
shift the handset between fixed and mobile service, depending on where the user is. The univer-
sal handset would serve as a cordless phone in the home and as a mobile handset outside the
home. The evolution to 3G will open the wireless local loop (WLL) with Public-Switched Tele-
phone Network (PSTN) and Public Data Network (PDN) access, while providing more conve-
nient control of applications and network resources. It will also open the door to convenient
global roaming, service portability, zone-based ID and billing, and global directory access. The
3G technology is even expected to support seamless satellite interworking.
With the cornucopia of benefits surrounding CDMA, it is evident that operators using this
platform will have every opportunity to grow the business once the community-based strategy
begins to unfold. The question is, when will they get serious about bringing these new capabili-
ties to market?
Preface xix
Recently an enhanced hybrid technology combining the CDMA air interface with the
GSM network has been built, tested, and evaluated. GSM operators can save over 60% in cumu-
lative capital costs using a GSM-CDMA overlay for network expansion of the GSM network
using IS-95 CDMA radio access in addition to, or as a substitute for, TDMA radio access. This
combines the spectral efficiency of CDMA with all GSM features, including seamless roaming
and network services. The GSM-CDMA technology provides operators with a way to serve mul-
tiple market segments economically and to offer various services on one network platform. In
addition to being a cost-effective network expansion solution, GSM-CDMA also paves an evolu-
tionary path to 3G services including high-speed data, multimedia, and mobile/fixed conver-
gence services.
CDMA is the selected approach for the 3G system, as evidenced by the proposals submitted
by the European Telecommunications Standards Institute (ETSI), the Association Radio Industry
Business (ARIB), and the Telecommunications Industry Association (TIA). The 3G cdma2000
uses a CDMA air interface based on the existing IS-95B standard to provide wireline-quality
voice service and high-speed data services, ranging from 144 kbps for mobile users to 2 megabits
per second (Mbps) for stationary users. It is important to note that cdma2000 is a core proposal of
the TIA for International Mobile Telecommunications-2000 (IMT-2000). Moreover, support for
cdma2000 is not limited to North America; Korean carriers have a great opportunity to provide
3G-like service with today’s existing CDMA technology. Mobile data rates of up to 114 kbps and
fixed peak rates beyond 1.5 Mbps are within reach before the end of the decade with today’s
CDMA technology. These capabilities will be provided without degrading the systems’ voice
transmission capabilities or requiring additional spectrum. This will have tremendous implica-
tions for the majority of operators that are spectrum constrained. A doubling of capacity and a
1.5-Mbps data rate capability within a 1.25-MHz channel structure look very appealing.
This book is an extension of the book Applications of CDMA in Wireless Communications
(Garg, Smolik, and Wilkes, Prentice Hall, 1997). In that book, the primary focus was on the
CDMA systems standardized by TIA and American Telecommunications Industries Standards
(ATIS) as standards IS-95 and IS-665. Since the publication of that book, CDMA technology
has undergone major changes and has become a viable technology for 3G systems. In this book,
I discuss those aspects of CDMA that are essential to understanding system capacity. I also pro-
vide guidelines for system parameters of a CDMA network. The book outlines a migration path
for CDMA to a 3G cdma2000 system.
In writing this book, I addressed the needs of practicing engineers and engineering manag-
ers by explaining CDMA concepts, system capacity, radio frequency (RF) engineering, and
other important aspects of the CDMA network. Students studying courses in telecommunica-
tions will also find this book useful as they prepare for careers in the wireless industry. I
included a sufficient amount of mathematics so that you can understand the operation of the
CDMA network, but I tried not to overwhelm you with very complex mathematical derivations.
This book can be used by practicing telecommunications engineers involved in the design
and operation of CDMA-based cellular/PCS networks as well as by senior or graduate students
xx Preface
BS and the MSC. The chapter also provides call flow diagrams for typical supplemen-
tary services, handoff scenarios, and Over-The-Air Service Provisioning (OTASP).
• Chapter 10. Handoff strategy used in IS-95 CDMA; power control schemes for the
reverse and forward links.
• Chapter 11. Various parameters used to identify an MS including International Mobile
Station Identity (IMSI), Mobile Station Number (MDN), Electronic Serial Number
(ESN), and station class mark. I focus on authentication procedures, including the
authentication of MS registration, MS originations, MS terminations, MS data bursts,
and Temporary Mobile Station Identity (TMSI) assignment. Also discussed are unique
challenge response procedures.
• Chapter 12. Basic guidelines for engineering a CDMA system, including a discussion
of propagation models, link budgets, the transition from analog operation to CDMA
operation, radio link capacity, facility engineering, border cells on a boundary between
two service providers, and interfrequency handoff.
• Chapter 13. Procedures for calculating the capacity of the reverse and forward link of
a CDMA system; a procedure to develop a link safety margin parameter for each of the
forward link channels.
• Chapter 14. Standards for data services supported by CDMA cellular/PCS systems;
highlights of the TIA IS-99, TIA IS-637, and TIA IS-657 standards. I describe the
architecture for each of the four data services (e.g., packet data, asynchronous data, fac-
simile, and short message services) and the protocol stacks supported by these services.
• Chapter 15. The cdma2000, 3G evolution of IS-95. The cdma2000 Radio Transmis-
sion Technology (RTT) is a wideband, SS radio interface that uses CDMA technology
to satisfy the needs of 3G wireless communication systems.
Appendix A presents traffic tables for a variety of blocking probabilities and channel
numbers. Appendix B comprises a list of abbreviations I introduce in the text and that are com-
mon to the industry. The references cited in Appendix C are papers and texts that I have found
useful and, when considered in addition to those cited in the text, provide a rich background for
readers interested in looking into digital wireless technology in greater depth.
I suggest chapters 1–11 for those who are interested in IS-95 standards but who do not
have much background in digital communications. Those who have adequate background in dig-
ital communications may skip chapters 1–4.
I recommend chapters 1, 2, 4–10, 12, and 13 for those who are involved with the design of
a CDMA system. The engineering managers should use chapters 1 and 5–12 to achieve adequate
knowledge of IS-95 CDMA.
I suggest chapters 1–8, 10–12, 13, and 15 for a one-semester graduate course in IS-95
CDMA and its evolution to cdma2000.
I would like to thank the many people who helped me prepare the material in this book. Bernard
Goodwin provided his encouragement in motivating me to write the book. Professor Ted Rappa-
xxii Preface
port of Virginia Tech took me under the banner of his new series. I acknowledge the many help-
ful suggestions I received from my many friends.
Finally, I acknowledge the assistance of my wife, Pushpa Garg, and the staff of BooksCraft,
Inc. during the production of this book.
C H A P T E R 1
Introduction to Access
Technologies
1.1 Introduction
After 18 months of market rollouts, digital cellular and Personal Communications Services
(PCS) providers have adequately demonstrated the power of Code Division Multiple Access
(CDMA) technology to support a marketing strategy based on low prices and superior perfor-
mance in key areas such as voice quality, system reliability, and handset battery life. According
to the CDMA Development Group (CDG), the market base for IS-95 platform providers has
grown from only 200,000 customers in 1997 to about 3.0 million in 1999.
CDMA service providers have a strong advantage in pursuing the market to the minutes-
of-use model, given the longevity of CDMA handset battery life and the higher quality of the
voice signal. A recent analysis of wireless platform performance by Telecommunications
Research and Action Center (TRAC) found that CDMA beat other digital and analog technolo-
gies on every front, including signal quality, security, power consumption, and reliability.
Although analog was more readily available, all three digital systems (GSM, IS-136 TDMA, and
IS-95 CDMA) were rated equally over analog with respect to enhanced service features. The
TRAC study found CDMA to be superior in signal security and voice quality over the other dig-
ital air interface standards. According to TRAC, CDMA has several advantages for consumers.
Lower power consumption enables CDMA handsets to support up to 4 hours of talk time or 48
hours of standby time on a single battery charge. It has also been found that the soft handoff
characteristics of CDMA lead to fewer dropped calls than GSM and IS-136 TDMA. One possi-
ble drawback for some CDMA customers is that there are some limitations on roaming capabili-
ties. Some PCS operators with cellular affiliates are supporting dual-mode handsets to allow
roaming between the CDMA and analog platforms.
The IS-95 standard is quite flexible, enabling service providers to allocate data in incre-
ments of 8 kilobits per second (kbps) within the 1.25-megahertz (MHz) CDMA channel band-
1
2 Ch. 1 • Introduction to Access Technologies
structure and employ frequency reuse within adjacent cells in such a way that each single cell
manages its own radio zone and radio circuit control within the mobile network, including traffic
management and handoff procedures. The amount of traffic supported in each cell is fixed
because of frequency limitations and also because of limited flexibility of radio transmission
which is optimized mainly for voice and low-data-rate transmissions. Increasing traffic leads to
costly cellular reconfigurations such as cell splitting and cell sectorization.
The multilayer cell structure in IMT-2000 aims to overcome these problems by overlay-
ing—discontinuously—picocells and microcells on the macrocell structure with wide area cov-
erage. Global/satellite cells can be used in the same sense to provide area coverage where
macrocell constellations are not economical to deploy and/or to support long distance traffic.
With low mobility and small delay spread profiles in picocells, high bit rates and high traf-
fic densities can be supported with low complexity as opposed to low bit rates and low traffic
load in macrocells that support high mobility. Users expect service to be selected in a uniform
manner with consistent procedures, irrespective of whether access to these services is fixed or
mobile. Freedom of location and means of access will be facilitated by smart cards, which allow
customers to register on different terminals with varying capabilities (speech, multimedia, data,
short messaging).
The choice of a radio interface parameter set corresponding to a multiple access scheme is
a critical issue in terms of spectral efficiency, taking into account the ever increasing market
demand for mobile communications and the fact that radio spectrum is a very expensive and
scarce resource. A comparative assessment of several different schemes has been carried in the
framework of the Research in Advanced Communications Equipment (RACE) program. One
possible solution is to use a hybrid CDMA/TDMA/FDMA technique, integrating the advantages
of each and meeting the varying requirements on channel capacity, traffic load, and transmission
quality in different cellular/PCS layouts. Disadvantages of such hybrid access schemes are the
high complexity and difficulties in achieving simplified low-power, low-cost transceiver design
as well as efficient flexibility management in the several cell layers.
CDMA is the selected approach for third-generation systems, as evidenced by the propos-
als in ETSI, ARIB (Japan), and the TIA. In Europe and Japan, Wideband CDMA (W-CDMA)
has been proposed to avoid IS-95 intellectual property rights (IPR). In North America,
cdma2000 uses a CDMA air-interface based on the existing IS-95 standard to provide wireline-
quality voice service and high-speed data services ranging from 144 kbps for mobile users to 2
megabits per second (Mbps) for stationary ones. The 64-kbps data capability of IS-95 will pro-
vide high-speed Internet access in a mobile environment, a capability that cannot be matched by
other narrowband digital technologies.
Mobile data rates of up to 114 kbps and fixed peak rates beyond 1.5 Mbps are within reach
before the end of the decade using wideband CDMA technologies. These services will be pro-
vided without degrading the systems’ voice transmission capabilities or requiring additional
spectrum. This will have tremendous implications for the majority of operators that are spectrum
constrained.
Multiple Access Technologies 5
Frequency 1 circuit
Frequency n circuit
Frequency
Domain
Frequency 1 circuit
Frequency n circuit
Time
Domain
Figure 1-1 Frequency Division Multiple Access (FDMA) with Frequency Division
Duplex (FDD).
6 Ch. 1 • Introduction to Access Technologies
• The maximum bit rate per channel is fixed and small, inhibiting the flexibility in bit-rate
capability that may be a requirement for computer file transfer in some applications.
In a TDMA system, information from each user is conveyed in time intervals called time
slots (see Fig. 1-2). Several time slots make up a time frame. Each time slot consists of a pream-
ble plus information bits. The functions of the preamble are to provide identification and inci-
dental information and to allow synchronization of the time slot at the intended receiver. Guard
times are provided between each user’s transmission to minimize crosstalk between channels.
Most TDMA systems time divide a frame into multiple slots used by different transmitters. This
approach is called Time Division Multiplex (TDM). The information is transmitted via a radio
carrier from a base station (BS) to several active mobile stations (MSs) in the downlink. In the
uplink, transmissions from mobile stations to a BS are time-sequence synchronized on a com-
mon frequency for TDMA. The advantages of TDMA are that it
• Allows a flexible bit rate, not only for multiples of a basic single channel but also sub-
multiples for low-bit-rate broadcast-type traffic.
• Potentially integrates in VLSI without narrowband filters, giving a low cost floor in vol-
ume production.
• Offers the opportunity for frame-by-frame monitoring of signal strength/bit error rates
to enable either mobiles or base stations to initiate and execute handoffs.
Frequency
Domain
Time
Domain
• Uses bandwidth more efficiently because no frequency guard band is needed between
channels.
• Transmits each signal with sufficient guard time between time slots and accommodates
time inaccuracies caused by clock instability, delay spread, transmission time delay
because of propagation distance, and the “tails” of signal pulses in TDMA because of
transient responses.
• There is no need for a dedicated duplex stage (duplexer). The only requirements are
that a fast switching synthesizer, RF filter paths, and fast antenna switch be available.
• It increases battery life or reduces battery weight.
• It provides phones with better quality and at a lower cost.
• It requires a single frequency band instead of the two in FDD.
8 Ch. 1 • Introduction to Access Technologies
1.6 Summary
In this chapter, we focused on the growth of CDMA technology in wireless communications. We
discussed the suitability of CDMA for future 3G systems to provide higher data rate access to
Internet/intranet services because it is the most suitable digital technology to handle future wire-
less communications demand.
We briefly described narrowband channelized and wideband nonchannelized technologies
and listed their advantages and disadvantages. Finally, we described modes of operations in
wireless communications.
1.7 References
1. Balston, D. M., “The Pan-European Cellular Technology,” IEE Conference Publication,
1988.
2. Balston, D. M., and Macario, R. C. V., Cellular Radio Systems, Artech House, Boston, 1993.
3. Dasilva, J. S., Ikonomou, D., and Erben, H., “European R&D Programs on Third-Genera-
tion Mobile Communications Systems,” IEEE Personal Communications 4(1), February
1997, pp. 46–52.
4. “The European Path Towards UMTS,” IEEE Personal Communications, special issue, Feb-
ruary 1995.
5. Garg, V. K., Smolik, K. F., and Wilkes, J. E., Applications of CDMA in Wireless/Personal
Communications, Prentice Hall, Upper Saddle River, NJ, 1997.
6. Garg, V. K., and Wilkes, J. E., Wireless and Personal Communications Systems, Prentice
Hall, Upper Saddle River, NJ, 1996.
7. Marley, N., “GSM and PCN Systems and Equipment,” JRC Conference, Harrogate, 1991.
8. Rapeli, J., “UMTS: Targets, System Concepts, and Standardization in a Global Framework,”
IEEE Personal Communications, special issue, February 1995.
9. Salmasi, A., “An Overview of Code-Division Multiple Access (CDMA) Applied to the
Design of Personal Communications Networks,” in Third Generation Wireless Information
Network, Nanda, S., and Goodman, D. J., ed., Kluwer Academic Publishers, Boston, 1992,
pp. 277–98.
C H A P T E R 2
2.1 Introduction
In this chapter we describe the different types of Spread Spectrum (SS) systems that are used
and then focus on the Direct Sequence Spread Spectrum (DSSS) technique that is employed in
CDMA IS-95 systems. We develop the necessary relationships to evaluate the performance of a
DSSS system with Binary Phase-Shift Keying (BPSK) and Quadrature Phase-Shift Keying
(QPSK) modulation schemes and provide a relationship to calculate the performance of a
CDMA system.
9
10 Ch. 2 • Direct Sequence Spread Spectrum and Spreading Codes
TO = (2 n -1 ) TC
TO =
Period of Output TC = time chip
Waveform
+1
-1
Frequency
fn
fn -1
fn -2
f3
f2
f1
0 Tc 2Tc
Figure 2-2 Frequency Hopping Spread Spectrum Approach
the message bit rate. In a slow-hop system, the hop rate is slower than the message bit
rate. There is, of course, an intermediate situation in which the hop rate and message bit
rate are the same.
FHSS radio systems experience occasional strong bursty errors, while DSSS
radio systems experience continuous but lower-level random errors. With DSSS radio
systems, single errors are dispersed randomly over time, whereas, with FHSS radio sys-
tems, errors are distributed in clusters. Bursty errors are attributable to fading or single
frequency interference, which is time and frequency dependent. DSSS spreads the
information in both the time and frequency domains, thus providing time and frequency
diversity and minimizing the effects of fading and interference.
3. Time-Hopped (TH) system, where the transmission time is divided into intervals
called frames (see Fig. 2-3). Each frame is divided into time slots. During each frame,
The Concept of Spread Spectrum System 11
Transmitted time
slots (k bits) M = time slots in each
frame; t = Tf / M
One Frame
0 t Tf 2Tf 3Tf
one and only one time slot is modulated with a message. All of the message bits accu-
mulated in previous frames are transmitted.
S
C = B w log 2 1 + ---- (2.1)
N
C S
------ = 1.44log e 1 + ---- (2.2)
Bw N
Since
S 1 S 2 1 S 3 1 S 4
log e 1 + ---- = ---- – --- ---- + --- ---- – --- ---- + …
S
N N 2 N 3 N 4 N
we use the logarithmic expansion and assume that the SNR is small, e.g., SNR ≤ 0.1, so we can
neglect the higher-order terms to rewrite Eq. (2.2) as
C N
B w ≈ ---------- × ---- (2.3)
1.44 S
For any given SNR we can have a low information error rate by increasing the bandwidth
used to transmit the information. As an example, if we want a system to operate on a link in
which the information rate is 10 kbps and SNR is 0.01, we must use a bandwidth of
3
10 × 10 6
B w = --------------------------- = 0.69 × 10 Hz or 690 kHz
1.44 × 0.01
Information can be modulated into the spread spectrum signal by several methods. The
most common method is to add the information to the spectrum-spreading code before it is used
for modulating the carrier frequency (Fig. 2-4). This technique applies to any SS system that
uses a code sequence to determine RF bandwidth. If the signal being sent is analog (voice, for
example), the signal must be digitized before being added to the spreading code.
B
G p = ------w (2.4)
R
* This assumes a fading radio environment, which is typical for analog cellular systems that use Frequency Modulation.
In the absence of fading, good FM performance is achievable at lower SNR.
The Concept of Spread Spectrum System 13
PN Sequence, ci (t )
cos (2π fc t )
xi (t )
Modulo-2 Baseband
Baseband d i (t )
Sum Filter
Typical processing gains for SS systems lie between 20 and 60 dB. With an SS system, the noise
level is determined both by the thermal noise and by interference. For a given user, the interfer-
ence is processed as noise. The input and output SNRs are related as
---
S
- = G p ----
S
(2.5)
N o N i
It is instructive to relate the SNR to the Eb /N0* ratio where Eb is the energy per bit and N0 is
the noise power spectral density.
---
S Eb × R Eb 1
- = ---------------- = ------ × ------ (2.6)
N i N0 × B N0 G p
E
-----b- = G p × ---- = ----
S S
(2.7)
N0 N i N o
EXAMPLE 2.1
Calculate the processing gain for a DSSS system that has a 10 Megachips per second (Mcps)
code clock rate and 4.8-kbps information rate. How much improvement in the processing gain
will be achieved if the code generation rate is changed to 50 Mcps? Is there an advantage in
going to a higher code generation rate with a 4.8-kbps information rate?
* The noise power spectral density actually consists of both the thermal noise and interference. Unless stated explicitly,
N0 represents the thermal noise. However, common usage of this ratio assumes that N0 includes both the thermal noise
and interference. With SS systems, interference is transformed into noise.
14 Ch. 2 • Direct Sequence Spread Spectrum and Spreading Codes
We assume that the DSSS waveform has a voltage distribution of (sinx)/x. The power distribu-
tion has a form of [(sinx)/x]2. The bandwidth of the main lobe is equal to the spreading code clock
rate.
7
1.0 × 10 3
G p = ---------------------3- = 2.1 × 10 = 33.1 dB*
4.8 × 10
With 50 Mcps
7
5 × 10 4
G p = ---------------------3- = 1.04 × 10 = 40.2 dB
4.8 × 10
By increasing the code generation rate from 10 to 50 Mcps, we get only 7dB improvement in
the processing gain. The effort required to get five times the operating speed of a circuit may be
much more demanding compared to an improvement of 7 dB in the processing gain.
x ( t ) = c ( t )s ( t ) = c ( t )d ( t ) 2S cos ω c t (2.8)
* dB = 10 log G
The Performance of DSSS 15
r ( t ) = c ( t ) [ x ( t ) + I ( t ) ] = c ( t ) [ c ( t )s ( t ) ] + c ( t )I ( t ) = s ( t ) + c ( t )I ( t ) (2.10)
since c(t)2 = 1. c(t)I(t) is the effective noise waveform due to interference.
The conventional BPSK detector output is given as
r = d Eb + n (2.11)
1 E
P b = --- erfc -----b- (2.12)
2 N 0
Modulo-2 I Baseband xi (t )
Information Rate, R i = 1/T Sum Filter
Modulo-2 Q Baseband
Sum Filter
Power
Amplifier
PN Sequence, cs (t )
rc = d c Eb + nc (2.14)
Tc
2
where n c = ----- ∫ c c ( t )I ( t ) cos ω c t dt ,
Ts
0
rs = d s Eb + ns (2.15)
Tc
2
where n s = ----- ∫ c s ( t )I ( t ) sin ω c t dt .
Ts
0
QPSK modulation can be viewed as two independent BPSK modulations. Thus the net
data rate is doubled. We consider a special case of QPSK modulation where cc(t) and cs(t) are
equal and have a value of c. The QPSK symbol energy is also the bit energy (one bit per QPSK
signal).
For this case Eqs. (2.14) and (2.15) have the form
E
r c = d -----b- + n c (2.16)
2
and
The Performance of DSSS 17
E
r s = d -----b- + n s (2.17)
2
where nc and ns are 0 mean independent with conditional variances
2
Var 〈n c|θ〉 = ( IT c ) ( cos θ ) (2.18)
and
2
Var 〈n s|θ〉 = ( IT c ) ( sin θ ) (2.19)
Next we use
( rc + rs ) E ( nc + ns )
r = ------------------- = d -----b- + --------------------
- (2.20)
2 2 2
1 2 2 IT
Var 〈( n c + n s ) ⁄ 2|θ〉 = --- [ IT c ( cos θ ) + IT c ( sin θ ) ] = --------c (2.21)
4 4
The final expression for narrowband interference, Gj (f ), at the demodulator baseband out-
put is given as
IT I
G j ( f ) = --------c = --------- (2.22)
4 4R c
I ( f ) = 2G j ( f ) ; 0 ≤ f ≤ Rc (2.23)
1 E 2E
P b = --- erfc -----b- = Q --------b- (2.24)
2 N 0 N0
2
–u ⁄ 2
e
where Q ( u ) ≈ -------------- u»1
2πu
We assume the demodulated baseband interference,* I, is represented by AWGN. For
coherent PSK demodulation we have
* This is not strictly true since the noise is known. It is sufficient for the purposes of this discussion.
18 Ch. 2 • Direct Sequence Spread Spectrum and Spreading Codes
E Eb S Rc
2 --- ------
1 1 1
P b = --- erfc -----b- = --- erfc ---------------------------
- = --- erfc (2.25)
2 N 0 2 ( 2I ) ⁄ ( 4R c ) 2 I R b
I
I eff = ------------------------ is referred to as the effective interference power.
2 ( Rc ⁄ Rb )
The effective interference power, in comparison with the signal power, determines the bit
error rate probability Pb of the SS system. Note that the effective interference power is reduced
by the ratio of the bandwidth expansion between the baseband signal and the transmitted signal,
(Rc /Rb).
si (t ) s i (t ) • ci (t )
ci (t )
Figure 2-6 Mobile Receiver
Bit Scrambling 19
Next, referring to Table 2-2, we consider the following set of activities at the given trans-
mitter location.
1. An arbitrary data sequence si(t) is generated by a digital source. In this case, we use +1s
and –1s to represent 0s and 1s (Fig. 2-6).
2. An arbitrary code sequence ci(t) is generated by a DS generator.
3. We multiply si(t) and ci(t). The output of the multiplier is transmitted to a distant
receiver.
4. At the distant location, the resulting sequence (again assuming no propagation delay) is
picked up by the receiver (Fig. 2-7).
5. The code c i (t) used at the transmitting location is assumed to be available at the
receiver.
6. The original data sequence is recovered by multiplying the received sequence by the
locally available code ci(t).
From Tables 2-1 and 2-2 we conclude that the modulo-2 addition using 1s and 0s binary
data is equivalent to multiplication using –1 and 1 binary data as long as we remain consistent in
mapping 0s to +1s and 1s to –1s as shown in Table 2-2. (For circuit implementation, the modulo-
2 addition is preferred since exclusive OR gates are cheaper than multiplication circuits. How-
ever, for modeling purposes, the multiplication method is usually easier to formulate and under-
stand than the modulo-2 approach).
We notice that, for the output of the receiver to be identical to the original data, the follow-
ing relationship must be satisfied:
si ( t ) ⋅ ci ( t ) ⋅ ci ( t ) = si ( t ) (2.26)
si (t ) • ci (t ) si (t ) • ci (t ) • ci (t ) si (t )
ci (t )
Figure 2-7 Mobile Receiver
20 Ch. 2 • Direct Sequence Spread Spectrum and Spreading Codes
In other words, ci(t) · ci(t) must be equal to unity. Note that ci(t) is a binary sequence made
up of 1s and –1s; therefore
if ci(t) is 1, ci(t) · ci(t) = 1 (2.27)
if ci(t) = –1, ci(t) · ci(t) = 1 (2.28)
In our previous discussion we assume that no propagation delay and no other processing
delay occurs between the transmitter and receiver input. Thus the code copy used at the
receiver is perfectly lined up with the initial code used at the transmitter. The two codes are said
to be in phase or in synchronization (synch). In practice, however, a propagation delay and
other processing delay occur between the transmitter and the receiver input. Therefore, the
receiver may be time shifted relative to the initial code at the transmitter, and the two codes are
no longer in synch. As a result, the output of the receiver will no longer be identical to the orig-
inal data, si(t).
In order to recover the original data si(t), we must tune the receiver code sequence to that of
the incoming code from the transmitter. In other words, we must time shift the receiver code in
order to line it up with the incoming code. It should be noted that, by synchronizing or tuning the
receiver code to the phase of the incoming code, the original data (shifted by propagation delay)
can now be recovered at the output of the receiver. In these examples, the data sequence and code
sequence have the same length (one code bit for each data bit) and are used for encrypting the
data bits. This is referred to as bit scrambling and does not result in spectrum spreading.
method has a relationship that defines the bit error rate as a function of the Eb /N0 ratio. If we know
the performance of the coding methods used on the signals and the tolerance of the digitized
voice and the data-to-errors ratio, we can define the minimum Eb /N0 ratio for proper system oper-
ation. If we maintain operation at this minimum Eb /N0, we can obtain the best performance of the
system. The relationship between the number of mobile users, M, the processing gain, Gp, and the
Eb /N0 ratio is therefore given as
Gp
M ≈ --------------------- (2.29)
( Eb ⁄ N 0 )
For a given bit error probability, the actual Eb /N0 ratio depends on the radio system design
and error correction code. It may approach but never equal the theoretical calculations.
The best performance that can be obtained is defined by the Shannon limit* in AWGN. In
Eq. (2.2), if we note that
S 1 S 2 1 S 3 1 S 4
log e 1 + ---- = ---- – --- ---- + --- ---- – --- ---- + … < ----
S S
N N 2 N 3 N 4 N N
and
1 E
------ < ------------- -----b- ------
C C
B w log e 2 N 0 B w
Thus
E
-----b- ≥ log e 2 = 0.69 = – 1.59 dB (2.30)
N0
Gp
M = ---------
- = 1.45G p (2.31)
0.69
This theoretical Shannon limit shows that CDMA systems can have more users per cell than tra-
ditional narrowband systems that are limited by number of dimensions. This limit is theoretical;
in practice a wireless system is typically engineered such that Eb /N0 ≈ 6 dB. However, due to
practical limitations on CDMA radio design, it is difficult to accommodate as many users in a
* This limit is a lower bound [7]. It is assumed that the channel coding has an infinite length to achieve this bound.
22 Ch. 2 • Direct Sequence Spread Spectrum and Spreading Codes
single cell as given by Eq. (2.29). The CDMA cell capacity depends upon many factors. As seen
by Eq. (2.29), the upper bound theoretical capacity of an ideal noise-free CDMA channel is lim-
ited by the processing gain Gp. In an actual system, the CDMA cell capacity is much lower than
the theoretical upper bound value. The CDMA cell capacity is affected by the receiver modula-
tion performance, power control accuracy, interference from other non-CDMA systems sharing
the same frequency band, and other effects.
CDMA transmissions in neighboring cells use the same carrier frequency and therefore
cause interference that we account for by introducing a factor β. This reduces the number of
users in a cell since the interference from users in other cells must be added to the interference
generated by the other mobiles in the user’s cell. The practical range for β is 0.4 to 0.55. The
power control accuracy is represented by a factor α. The practical range for α is 0.5 to 0.9. We
designate the reduction in the interference due to voice activity by a factor υ. The practical range
for υ is 0.45 to 1. If directional antennas are used rather than omnidirectional antennas at the
base station, the cell is sectorized with A sectors. Each of the antennas used at the cell radiates
into a sector of 360/A degrees and we have an interference improvement factor of λ. For a three-
sector cell, the practical value of the improvement factor λ is 2.55. The average values for β, α,
υ, and λ are 0.5, 0.85, 0.6, and 2.55, respectively.
Introducing β, α, υ, and λ into Eq. (2.29) we get
Gp 1 1
M ≈ ---------------- × ------------ × α × --- × λ (2.32)
Eb ⁄ N 0 1 + β υ
EXAMPLE 2.2
Estimate the number of mobile users that can be supported by a CDMA system using an RF band-
width of 1.25 MHz to transmit data at 9.6 kbps. Assume: Eb /N0 = 6 dB; the interference from neigh-
boring cells β = 60%; the voice activity factor υ = 50%; the power control accuracy factor α = 0.8.
6
1.25 × 10
G p = ------------------------
3
- = 130
9.6 × 10
E
-----b- = 6 dB = 3.98
N0
130 1 1
M = ---------- × ---------------- × ------- × 0.8 = 32.64 ≈ 33 mobile users per sector
3.98 1 + 0.6 0.5
The results of this example can be compared with the capacity of an analog FM system with the
same frequency allocation, i.e., 41 FM channels. Typically, an analog system is engineered with
a frequency reuse pattern equal to 7. With a three-sector configuration and a reuse factor of 7, the
number of channels per sector equals 41/(7 × 3) ≈ 2. This comparison suggests that a DSSS sys-
tem offers a greater than tenfold improvement in the channel capacity. It is interesting to note
The Performance of a CDMA System 23
that the processing gain of a DSSS system is directly proportional to spectrum expansion while
the processing gain of an FM system is proportional to the square of the frequency expansion.*
This would seem to imply that the FM system should perform better than the CDMA system; yet
it doesn’t. There are several reasons for this CDMA performance:
• DSSS techniques take advantage of the voice activity.
• DSSS techniques use the concept of orthogonality to multiple users on a common fre-
quency channel. This concept is applicable across different base stations and sectors.
• DSSS techniques synchronize transmission for all base stations so that soft handoffs
(see chapter 10) can be implemented. This approach reduces the level of interference.
EXAMPLE 2.3
For the CDMA system (TIA IS-95), a chip rate† of 1.2288 Mcps is specified for the data rate of 9.6
kbps. Eb /N0 is taken as 6.8 dB. Estimate the average number of subscribers that can be supported by
a sector of the 3-sector cell. Assume: interference from neighboring cells β = 50%; the voice activity
factor υ = 60%; the power control accuracy factor α = 0.85; and the improvement from sectorization
λ = 2.55.
Gp 1 1
M ≈ ---------------
- × ------------ × α × --- × λ
Eb ⁄ N 0 1 + β υ
( 1 ⁄ 9.6 )
G p = ------------------------------------------
3
= 128 , E b ⁄ N 0 = 6.8 dB = 4.7863
( 1 ⁄ 1.2288 × 10 )
128 1 1
M = ---------------- × ------- × ------- × 0.85 × 2.55 = 64.4
4.7863 1.5 0.6
64.4
Subscriber/Sector = ---------- = 21.46 ≈ 21
3
EXAMPLE 2.4
A total of 40 equal-power mobile stations are to share a frequency band through a CDMA system.
Each mobile station transmits information at 9.6 kbps with a DSSS BPSK modulated signal. Calcu-
late the minimum chip rate of the psudorandom noise (PN) code in order to maintain a bit error
probability of 10–3. Assume: the interference factor β from the other base stations = 60%; voice
activity υ = 50%; and power control accuracy factor α = 0.8. What will chip rate be if the probability
of error is 10–4?
–E ⁄ N
2E e b 0
P b = Q --------b- ≈ --------------------------------
N0 2 π( E ⁄ N )
b 0
–E ⁄ N
e b 0 –3
-------------------------------- = 10
2 π ( Eb ⁄ N 0 )
E
-----b- ≈ 4.8 = 6.8 dB
N0
Gp 1 1
- × ------------ × --- × α
M = --------------------
( Eb ⁄ N 0 ) 1 + β υ
G 1 1
------p- × ------- × ------- × 0.8 = 40
4.8 1.6 0.5
∴G p = 192
3
∴ R c = 192 × 9.6 × 10 = 1.843 Mcps
–4 E
For P b = 10 , -----b- = 8.43 dB = 6.9663
N0
+
Modulo-2 Adder
X1 X2 X3 X4 Output
Clock
Figure 2-8 Four-Stage Linear Feedback Shift Register
26 Ch. 2 • Direct Sequence Spread Spectrum and Spreading Codes
TC = Time Chip
+1
-1
clock pulses is T0 = 2n – 1. If a linear feedback shift register generates a maximal sequence, then
all of its nonzero output sequences are maximal, regardless of the initial stage. A maximal
sequence contains (2n – 1 – 1) 0s and (2n – 1) 1s per period.
+ + + +
h1 h2 hn -2 hn -1
x n -1 x n -2 x1 x0
n
2 – 1, τ = 0
θ(τ) =
–1 , τ ≠ 0
where τ = the shift in increments of one chip (see Figure 2-11 as an example of n =
3), and
n = the number of stages in the shift register.
In the region between τ = 0 and τ = ±1, the correlation function decreases linearly
from 2n – 1 to –1 so that the autocorrelation function for a maximal-length pseudoran-
dom sequence is triangular with a maximum value at τ = 0 (see Example 2.5). With
this property, two or more communicators can operate independently if their codes are
phase shifted more than one chip. For other code sequences, the autocorrelation proper-
ties may be markedly different than the properties of the maximal-length sequences.
• Every possible state of a given n-stage generator exists at some time during the genera-
tion of a complete code cycle. Each state exists for one and only one clock interval. The
exception is that the all-0s state does not normally occur and is not allowed to occur.
It has been shown [11] that there are exactly 2n – (p + 2) runs of length p for both 1s and 0s in
every maximal sequence (except that there is only one run containing n 1s and one containing
(n – 1) 0s; there are no runs of 0s of length n or 1s of length (n – 1). The distribution of runs for
(24 – 1) chip sequence is given in Table 2-4.
Whether an n-stage linear feedback shift register generates only one sequence with period
n
2 – 1 depends upon its connection vector (see Fig. 2-10). Let h(x) be the nth-order polynomial
given by
2 n
h ( x ) = h0 + h1 x + h2 x + … + hn x (2.33)
We refer to h(x) as the associated polynomial of the shift register with feedback coefficient (h0,
h1, h2, … hn). Here h0 = hn = 1 and other feedback coefficients take values 0 and 1. Thus, the
polynomial for the four-stage linear feedback shift register as shown in Fig. 2-8 is given by
3 4
h( x ) = 1 + x + x (2.34)
When h(x) is an irreducible (not factorable) primitive polynomial of degree n, then all
sequences generated by h(x) have a maximum period of 2n – 1. For an n-stage register, there are
Np(n) maximal sequences that can be generated [11]. Np(n) is the number of primitive polyno-
mial of degree n.
n k
2 –1 P –1
N p ( n ) = --------------
n ∏ -------------
i
Pi
- (2.35)
i=1
2.7.2 Autocorrelation
The autocorrelation function for a signal x(t) is defined as
∞
Rx(τ) = ∫ x ( t )x ( t + τ ) dt (2.36)
–∞
Table 2-5 Number of Maximal Sequences Available from Register Lengths 2 Through 10
Prime Example of Primitive
No. of Decomposition No. of n-sequence Polynomial of degree
Stage n 2n – 1 of 2n – 1 Np(n) n h(x)
3 2 2
2 3 3 --- ⋅ --- = 1 1+x+x
2 3
7 6 3
3 7 7 --- ⋅ --- = 2 1+x+x
3 7
3×5 15 2 4 1+x+x
4
4 15 ------ ⋅ --- ⋅ --- = 2
4 3 5
31 30 2 5
5 31 31 ------ ⋅ ------ = 6 1+x +x
5 31
3×3×7 63 2 6 6
6 63 ------ ⋅ --- ⋅ --- = 6 1+x+x
6 3 7
127 126 3 7
7 127 127 --------- ⋅ --------- = 18 1+x +x
7 127
3 × 5 × 17 255 2 4 16 2 3 4 8
8 255 --------- ⋅ --- ⋅ --- ⋅ ------ = 16 1+x +x +x +x
8 3 5 17
7 × 73 511 6 72 4 9
9 511 --------- ⋅ --- ⋅ ------ = 48 1+x +x
9 7 73
3 × 11 × 31 1023 2 10 30 3 10
10 1023 ------------ ⋅ --- ⋅ ------ ⋅ ------ = 60 1+x +x
10 3 11 31
30 Ch. 2 • Direct Sequence Spread Spectrum and Spreading Codes
T0 ⁄ 2
1
∫
2
where R x ( 0 ) = ----- x ( t ) dt
T0
–T 0 ⁄ 2
2.7.3 Cross-Correlation
The cross-correlation function between two signals, x(t) and y(t), is defined as the correla-
tion between two different signals x(t) and y(t) and is given as
T0 ⁄ 2
EXAMPLE 2.5
Consider a three-stage shift register generator that is generating a seven-chip maximal linear code. The
reference sequence is 1 1 1 0 0 1 0. Sketch the autocorrelation function if the chip rate is 10 Mcps.
Table 2-6 provides the sequence after each shift and shows the corresponding agreements (A)
and disagreements (D) with the reference sequence.
It can be noted that the net correlation A – D is –1 for all shifts except for the 0-shift or syn-
chronous condition. This is typical of all n-sequences. In the region between 0 and plus or minus one
chip shift (τ = ±1/106 seconds), the correlation increases linearly so that the autocorrelation function
for an n-sequence is triangular as shown in Fig. 2-11. This characteristic of autocorrelation is used to
great advantage in communication systems. A channel can simultaneously support multiple users if
the corresponding codes are phase shifted more than one chip.
Pseudorandom Noise Sequences 31
R (t )
+1
0
t
- 1/7
With orthogonal symbol modulation, the information bit stream can be divided into
blocks, with each block representing a nonbinary information symbol that is associated with a
particular transmitted code sequence. If there are b bits per block, one of the set of K = 2b func-
tions is transmitted in each symbol interval. The signal at the receiver is correlated with the set
of K matched filters, each matched to the code function of one symbol. The outputs from corela-
tors are compared and the symbol with the largest output is taken as the transmitted symbol.
If we assume a simple one-path channel with perfect power control and negligible additive
noise, and if we include the interference due to multipath, multiple users, and the decision pro-
cess of the correlators, the Eb /N0 ratio can be given as [8]
E Gp
-----b- ≈ ------------------------------------------
- (2.39)
N0 ( M – 1) + (K – 1)
Gp
M = ---------------- –K+2 (2.40)
Eb ⁄ N 0
Next we introduce factors β, α, υ, and λ (see Section 2.6) in Eq. (2.40) to get
Gp 1 1
M ≈ ---------------- × ------------ × α × --- × λ – K + 2 (2.41)
Eb ⁄ N 0 1 + β υ
MR M ⋅ log 2 K R s M ( log 2 K )
η = --------- = -----------------------------
- = ------------------------
- (2.42)
Bw Bw Gp
EXAMPLE 2.6
Calculate the bandwidth efficiency of the system using the data in Example 2.2 and assuming an
orthogonal code with K = 2 symbols. If an orthogonal code with K = 16 symbols is used for the sys-
tem, how many simultaneous mobile users can be supported and what is the bandwidth efficiency of
the system?
• K = 2 symbols
6
1.25 × 10 E
- = 130 , -----b- = 6 dB = 3.98
G p = ------------------------
3
9.6 × 10 N0
Pseudorandom Noise Sequences 33
130 1 1
M ≈ ---------- × ---------------- × ------- × 0.8 – 2 + 2 = 32.64 ≈ 33 users
3.98 1 + 0.6 0.5
M ( log 2 K ) 33 ( log 2 2 )
η = ------------------------
- = -----------------------
- = 25.4 %
Gp 130
• K = 16 symbols
130 1 1
M ≈ ---------- × ---------------- × ------- × 0.8 – 16 + 2 = 18.64 ≈ 19 users
3.98 1 + 0.6 0.5
M ( log 2 K ) 19 ( log 2 16 )
η = ------------------------
- = --------------------------
- = 58.5%
Gp 130
The bandwidth efficiency of the system is improved by 33.1%. The disadvantage of the
orthogonal signaling scheme is the complexity of the receiver design. In this example, we need 16
receiver correlators per user channel instead of only one required in the simplest design.
The TIA IS-95 CDMA system uses orthogonal functions for the spreading code on the
forward channel and orthogonal functions for the modulation on the reverse channel.* One of 64
possible modulation symbols is transmitted for each group of 6 code symbols. The modulation
symbol is one member of the set of 64 mutually orthogonal functions. The orthogonal functions
have the following characteristic:
M–1
∑ φi ( kτ )φ j ( kτ ) = 0 i≠ j (2.43)
k=0
where φi (kτ) and φj (kτ) are the ith and jth orthogonal members of an orthogonal set,
M is the length of the set, and
τ is the symbol duration.
Walsh functions are generated by code-word rows of special square matrices called Had-
amard matrices. These matrices contain one row of all 0s, with the remaining rows each having
an equal number of 1s and 0s. Walsh functions can be constructed for block length N = 2j, where
j is an integer.
The TIA IS-95 CDMA system uses a set of 64 orthogonal functions generated by using
Walsh functions. The modulated symbols are numbered from 0 through 63.
The 64 × 64 matrix can be generated by using the following recursive procedure:
H1 = 0 H2 = 0 0 (2.44)
01
* The IS-665 wideband CDMA system uses the orthogonal codes for spreading in both directions; see chapter 8.
34 Ch. 2 • Direct Sequence Spread Spectrum and Spreading Codes
0 0 0 0
HN HN
H4 = 0 1 0 1 H2 N = (2.45)
0 0 1 1 HN HN
0 1 1 0
User # 1, s 1 (t )
X X
.
.
. Σ X
Walsh N PN Code for Base Station
cos (2 π fc t )
User # N, sN (t )
X X
Figure 2-12 Applications of Walsh Functions and Offset Code at the Base Station
Pseudorandom Noise Sequences 35
PN
X X X
Sample at
t=T
Coherent Carrier Walsh i
cos (2 π fc t )
Figure 2-13 Applications of Walsh Functions and Offset Code in the Mobile Station
• The multiplication by the synchronized Walsh function for the ith user eliminates the
interference due to transmission from the BS to other users.
The Walsh functions form an ordered set of rectangular waveforms taking only two ampli-
tudes: +1 and –1. They are defined over a limited time interval TL, known as the time base. If φi
represents the ith Walsh function and TL is the time base, then
TL
1
TL ∫ i
------ φ ( t )φ j ( t ) dt = 0 for i ≠ j (2.46)
0
and
TL
1
TL ∫ i
2
------ φ ( t ) dt = 1 for all is (2.47)
0
To correlate the Walsh codes at the receiver requires that the receiver be synchronized with
the transmitter. In the forward direction the base station can transmit a pilot signal to enable the
receiver to recover synchronization. Walsh symbol modulation is used from the mobile station to
the base station.
EXAMPLE 2.7
We consider a case where 8 chips are used per bit to generate the Walsh functions. Specify these
functions, sketch them, and show that they are orthogonal to each other.
36 Ch. 2 • Direct Sequence Spread Spectrum and Spreading Codes
φ
1
0 0 0 0 0 0 0 0 φ2
0 1 0 1 0 1 0 1 φ3
0 0 1 1 0 0 1 1
H4 H4
0 1 1 0 0 1 1 0 φ4
H8 = = =
H4 H4 0 0 0 0 1 1 1 1 φ5
0 1 0 1 1 0 1 0
φ6
0 0 1 1 1 1 0 0
0 1 1 0 1 0 0 1 ϕ7
φ8
Figure 2-14 shows the sketches of the eight Walsh functions. We consider φ2 and φ4 to show
orthogonality.
1 1
TL 2∫
------- φ ( t )φ ( t ) dt = ------- [ – 1 × – 1 + 1 × 1 + 1 × – 1 + 1 × ( – 1 ) + ( – 1 ) × ( – 1 ) + 1 × 1 + 1 × – 1 + 1 × – 1 ] = 0
4 TL
φ1
φ5
-1 -1
φ2
φ6
-1 -1
φ3
φ7
-1 -1
φ4
φ8
-1 -1
and
1 2 1
T L∫ 1
------ φ ( t ) dt = ------ [ T L ] = 1
TL
Similarly, we can show that all eight Walsh functions are orthogonal to each other.
EXAMPLE 2.8
We consider a case where 8 chips are used per bit to generate the Walsh functions. Stations A, B, C,
and D are assigned the chip sequence 0 1 0 1 0 1 0 1, 0 0 1 1 0 0 1 1, 0 1 1 0 0 1 1 0, and 0 0 0 0 1 1 1
1, respectively. The stations use the chip sequence to send a 1 bit and negative chip sequences to send
a 0 bit (e.g., station A uses 1 0 1 0 1 0 1 0 to send the 0 bit and so on). All chip sequences are pairwise
orthogonal. This implies that the normalized correlation of any two distinct chip sequences is 0 and
the normalized correlation of any chip sequence with itself is 1. We assume that all stations are syn-
chronized in time, so all chip sequences begin at the same instant. When two or more stations transmit
simultaneously, their bipolar signals add linearly. For example, if in one chip period three stations
output +1 and one station outputs –1, the net result is +2. We consider five different cases when one or
more stations transmit. We want to show that the receiver recovers the bit stream of station C by com-
puting the normalized inner products of the received sequences with the chip sequence of station C.
Chip Sequence Binary Values of Chip Sequence
A: 0 1 0 1 0 1 0 1 A: (–1 +1 –1 +1 –1 +1 –1 +1)
B: 0 0 1 1 0 0 1 1 B: (–1 –1 +1 +1 –1 –1 +1 +1)
C: 0 1 1 0 0 1 1 0 C: (–1 +1 +1 –1 –1 +1 +1 –1)
D: 0 0 0 0 1 1 1 1 D: (–1 –1 –1 –1 +1 +1 +1 +1)
Normalized inner products are
( S1 ⋅ C ) ⁄ 8 = ( 1 + 1 + 1 + 1 + 1 + 1 + 1 + 1 ) ⁄ 8 = 1
( S2 ⋅ C ) ⁄ 8 = ( 2 + 0 + 0 + 2 + 0 + 2 + 2 + 0 ) ⁄ 8 = 1
( S3 ⋅ C ) ⁄ 8 = ( 3 + 1 + 1 – 1 + 3 + 1 + 1 – 1 ) ⁄ 8 = 1
( S4 ⋅ C ) ⁄ 8 = ( 2 + 0 + 0 – 2 + 2 + 0 + 0 – 2 ) ⁄ 8 = 0
( S5 ⋅ C ) ⁄ 8 = ( 1 – 1 – 1 – 3 + 1 – 1 – 1 – 3 ) ⁄ 8 = –1
Thus, the receiver recovers 1 1 1 - 0 bit sequence for station C.
We assumed that all the chips are synchronized in time. In a real situation, this is impossible.
The sender and receiver are synchronized by having the sender transmit a known chip sequence long
enough for the receiver to lock onto. All other (unsynchronized) transmissions are then seen as ran-
dom noise.
2.8 Summary
In this chapter we considered the concept of spread spectrum systems and provided the main
features of the direct sequence spread spectrum system used in the IS-95 system. A key compo-
nent of spread spectrum performance is the calculation of processing gain of the system, which
38 Ch. 2 • Direct Sequence Spread Spectrum and Spreading Codes
is the relationship between the input and output SNR of a spread spectrum receiver. We used the
relationship to present some examples that evaluate the performance of a CDMA spread spec-
trum system.
We presented the Shannon equation for error-free communications and used it to show
that error-free communication is possible (with high delays) for an energy-per-bit-to-noise-
density ratio, Eb /N0 = –1.59 dB. SS systems trade bandwidth for processing gain, and code divi-
sion systems use a variety of orthogonal or almost orthogonal codes to allow multiple users in
the same bandwidth. Thus, CDMA systems can have a higher capacity than either analog or
TDMA digital systems. However, because of practical constraints on CDMA systems, it is not
possible to achieve the Shannon bound in system design. The upper bound of the capacity of a
CDMA system is limited by the processing gain of the system. In an actual system, the capacity
is lower than the theoretical upper bound. CDMA capacity is affected by receiver modulation
performance, power control accuracy, interference from other cells, voice activity, cell sector-
ization, and the ability to maintain synchronization of the systems. Practical CDMA systems
are designed for a value of Eb /N0 = 6–7 dB.
2.9 Problems
1. A total of 18 equal-power mobile users per cell are to share a frequency band through a
CDMA system. Each mobile user transmits data at 19.2 kbps with a DSSS QPSK-
modulated signal. Calculate the minimum chip rate of the PN code in order to maintain
a bit error probability of 10–4. Assume that the interference factor β from the other base
stations = 0.60; power control accuracy α = 0.8; gain from 3-sector antenna λ = 2.55.
What will the chip rate be if the probability of the bit error is 10–6?
2. Consider a case where 16 chips per bit are used to generate the Walsh functions. Spec-
ify the functions and sketch W0, W8, W12, and W15. Show that these Walsh functions are
orthogonal.
3. For a three-stage linear shift register generator, how many maximal-length PN
sequences are generated? What is the location of the modulo-2 adder for each
sequence? What is the period of the maximal-length sequence?
References 39
4. Consider a four-stage linear shift register generator with the initial state of the register
1001 (see Fig. 2-15). Show that it generates a maximal-length sequence. Demonstrate
the properties of maximal-length sequence. Sketch the autocorrelation function. What
is the location of the modulo-2 adder for the other maximal-length sequence?
Modulo-2 Adder
X1 X2 X3 X4 output
5. Estimate the number of mobile users that can be supported by a CDMA three-sector
cell using an RF bandwidth of 1.23 MHz and a chip rate of 1.2288 Mcps to transmit
Rate Set 2(RS2) information at 14.4 kbps. Assume (Eb /N0)reqd = 7 dB; the interference
from neighboring cells β = 0.67; the voice activity factor υ = 0.6; power control accu-
racy factor α = 0.8; gain from three-sector antenna λ = 2.55.
6. We consider a case where 8 chips per bit are used to generate the Walsh functions.
Mobile stations A, B, C, and D are assigned W2 , W5 , W6 , and W7 , respectively. The sta-
tions use the Walsh sequence to send a 1 binary bit and a negative Walsh to transmit a 0
binary bit. Assuming all stations are synchronized in time, the chip sequences begin at
the same instant. When two or more stations transmit simultaneously, their bipolar sig-
nals are added linearly. Considering the following four cases when one or more stations
transmit, show that the receiver recovers the bit stream of stations B and C.
Station (A, B, C, D)
(–) means no transmission by that station Transmitting Stations
––10 C+D
111– A+B+C
11–– A+B
110– A+B+C
2.10 References
1. Bhargava, V., Haccoum, D., Matyas, R., and Nuspl, P., Digital Communications by Satellite,
John Wiley & Sons, New York, 1981.
2. Dixon, R. C., Spread Spectrum Systems, Ed., John Wiley & Sons, New York, 1984.
40 Ch. 2 • Direct Sequence Spread Spectrum and Spreading Codes
3. Feher, K., Wireless Digital Communications Modulation and Spread Spectrum Applications,
Prentice Hall PTR, Upper Saddle River, NJ, 1995.
4. Garg, V. K., and Wilkes, J. E., Wireless and Personal Communications Systems, Prentice
Hall, Upper Saddle River, NJ, 1996.
5. Lee, W. C. Y., Mobile Cellular Telecommunication Systems, McGraw-Hill, New York, 1989.
6. Pahlwan, K., and Levesque, A. H., Wireless Information Networks, John Wiley & Sons, New
York, 1995.
7. Shannon, C. E., “Communications in the Presence of Noise,” Proceedings of the IRE, no.
37, 1949, pp. 10–21.
8. Skalar, B., Digital Communications—Fundamental & Applications, Prentice Hall, Engle-
wood Cliffs, NJ, 1988.
9. Steele, R., Mobile Radio Communications, IEEE Press, New York, 1992.
10. Torrien, D., Principle of Secure Communication Systems, Artech House, Boston, 1992.
11. Virterbi, A. J., CDMA, Addison-Wesley Publishing Company, Reading, MA, 1995.
12. Viterbi, A. J., and Padovani, Roberto, “Implications of Mobile Cellular CDMA,” IEEE
Communication Magazine 30(12), 1992, pp. 38–41.
C H A P T E R 3
3.1 Introduction
In this chapter, we consider the speech and channel coding applications in the IS-95 CDMA sys-
tem (the data application is discussed in chapter 14). Since speech encoding is critical to digital
transmission and since it is the primary application needed for most wireless phone uses, we will
focus on the speech coding algorithms used by CDMA. CDMA uses an 8-kbps (or a 13.3-kbps)
data rate for voice transmission.
The wireline network is based on voice transmission using digital Pulse Code Modulation
(PCM) at 64 kbps and data transmission at rates of 64 kbps or multiples of 64 kbps. Many older
analog facilities still exist, especially in residential areas, and these use voice band modems at
rates of up to 28.8 kbps for data and analog electrical signals for voice. At the central office the
analog voice and analog data are converted to digital signals using PCM or, optionally, using
modem pools for data.
It would be optimal if identical systems could be used for all wireless communications.
Unfortunately error rates on radio channels are many orders of magnitude higher than those of
copper or fiber-optic cables. In addition, PCM is inefficient for use over scarce and expensive
radio channels.
CDMA systems use an efficient method of speech coding and extensive error recovery
techniques to overcome the harsh nature of the radio channel. The CDMA system uses a Code-
Excited Linear Predictor (CELP) speech coding system at 9.6 kbps (optionally at 13.3 kbps).
41
42 Ch. 3 • Speech and Channel Coding
Input Output
Analog 64-kbps
Speech PCM
it is not necessary to send the entire 20-Hz to 20,000-Hz signal normally used for high-fidelity
music. Intelligible speech communications can occur with a much narrower and therefore more
efficient range of frequencies. For telephone communications, the speech signal is band limited
to a frequency range of 300 to 3,300 Hz. To achieve telephone-quality speech, 12 bits per sample
are required at a sampling rate of 8,000 samples per second. However, by using a logarithmic
sampling system, 8 bits per sample are sufficient. Each sample is then quantized into one of 256
levels. Telephone speech uses two widely different variations of PCM to achieve quality speech
(µ-law and A-law PCM). Both are based on a nonuniform quantization of the signal amplitude
according to a logarithmic scale rather than a linear scale. Such coders utilize the static character-
istics of amplitude nonstationary in speech to achieve good quality at a bit rate of 64 kbps. This is
the basis of PCM.
The decoder for PCM (Fig. 3-2) inverts the stages of the encoding process. PCM encoding
and decoding are inherently simple systems. However, they require a high bit rate for transmission.
For PCM, North America and Japan use µ-law encoding where the output digital signal,
s(t), is related to the input signal, i(t), by
ln ( 1 + µ i ( t ) )
s ( t ) = sgn [ i ( t ) ] -----------------------------------, –1 ≤ i ( t ) ≤ 1 (3.1)
ln ( 1 + µ )
where a typical value for µ = 255 is used in the United States. In Eq. (3.1), the input signal is
normalized to a range of ±1. It can be noted that, for small i(t), s(t) approaches a linear function;
for large i(t), s(t) approaches a logarithmic function. The purpose of µ-law encoding is to
improve the SNR for weak speech signals. The overall data rate is 64 kbps, with sampling at 8
kbps and 8 bits per sample.
Input Output
64-kbps Analog
PCM Speech
Analog-to- Compandor
Band- Band-
Digital µ-law
Limited Limited
Converter or
Filter Filter
(8 bits) A-law
In Europe, PCM uses A-law encoding where the output digital signal, s(t), is related to the
input signal, i(t), by
1 + ln ( A i ( t ) ) 1
s ( t ) = sgn [ i ( t ) ] -----------------------------------, --- ≤ i ( t ) ≤ 1
1 + ln A A (3.2)
1 + ( A i(t ) ) 1
s ( t ) = sgn [ i ( t ) ] ------------------------------, 0 ≤ i ( t ) ≤ ---
1 + ln A A
where a typical value of A = 87.6 is used in Europe. In Eq. (3.2), the input signal is also normal-
ized to a range of ±1.
Note that s(t) is logarithmic for |i(t)| < 1/A and linear for |i(t)| > 1/A. Thus, A-law provides
a somewhat flatter signal-to-distortion performance compared to µ-law when the signal is
greater than 1/A, at the expense of poorer performance at low signal levels.
Telephone communications that cross borders of continents must have conversion routines
in their transmission paths if the two continents use different encoding laws.
Nonuniform-
+ Adaptive
PCM
Encoder
to-Uniform
PCM + 15-level
Quantizer
Converter
Inverse
Adaptive Adaptive
Predicator 15-level
Quantizer
Inverse Uniform-to-
+ Synchronous
Adaptive
15-level
Quantizer
+ Nonuniform
PCM
Converter
Coding
Adjustment
PCM
Decoder
+
Signal
Estimate
Adaptive
Predicator
PCM signal. The processing in the synchronous coding adjustment stage ensures that the PCM
signal is modeled correctly by converting it to uniform PCM and comparing the resulting error
signals with the actual received signal. If an error occurs, it is corrected before the output PCM
signal is generated. The ADPCM signal conforms to International Telecommunications Union
(ITU) recommendation G.721. Finally, if analog speech is needed, the signal is processed by a
PCM decoder.
The IS-665 standard supports a modified version of ADPCM that has been optimized for
the PCS environment. The functional operation is the same as ADPCM; the coding algorithm
has been modified. (Refer to the IS-665 standard for details.)
Speech Coding 45
Output
Speech
Synthesis Spectral
Codebook
X Filter—
Pitch &
Format
Postfilter
and
Gain Control
Output
Speech
Compute
Determine
DC Offset Hamming Auto-
LPC
Removal Window correlation
Coefficients
Coefficients
Scale LPC
Coefficients
Analog- µ-law PCM-
to-Uniform to-
PCM Uniform PCM
Converter Converter
Transform
LPC
Coefficients
into LSPs
LSP determination (Fig. 3-7). The encoder for the LSP codes first converts the speech to
uniform PCM with at least 14 bits. If the encoder is in a base station, then the received
speech is most likely µ-law PCM; if the encoder is in a mobile station, then the received
speech is analog. After the speech is converted to PCM, it is processed to remove the DC
component and filtered by a Hamming window. The autocorrelation of the sampled output
is then computed and used to determine the coefficients for the LPC. The LPC coefficients
are then scaled, transformed into the frequency components, and converted into the values
for the i bits of the coder output.
The pitch lag and gain bits (Fig. 3-8). These are computed by a recursive process where
the output of the PCM encoder is combined with the LSP codes previously calculated
Speech Coding 49
and with all possible values of pitch and gain. For each value of pitch and gain, an error
function is computed and the transmitted values for pitch and gain are chosen to mini-
mize the error.
The codebook index and gain (Fig. 3-9). These are computed in a recursive process sim-
ilar to the pitch lag and gain bits using the uniform PCM signal; the computed values for
frequency, pitch, and gain; and all possible codebook values and gains.
For the rate 1/8 system, codebook indices are not computed—this type of system uses a
random vector generated at both sides.
For every frame or subframe the excitation waveform is selected from a codebook consist-
ing of a large number of candidate waveform vectors. The codebook vector chosen to excite the
speech coder filters minimizes the weighted error between the original and synthesized speech.
Choose
Compute
L & b to
Uniform PCM Error
Minimize
Function
Error
Output
Lag (L) &
Gain (b)
LSP Codes (a)
All Possible
Values of L & b
Choose
Compute
G & I to
Uniform PCM Error
Minimize
Function
Error
Output
Codebook (I ) &
Gain (G)
LSP Codes (a)
Pitch Lag and Gain (L & b)
All Possible
Values of I & G
Figure 3-9 CELP Encoder for Codebook Values
50 Ch. 3 • Speech and Channel Coding
Unlike conventional CELP encoders, EVRC does not attempt to match the original speech
signal exactly. Instead, EVRC matches a time-wrapped version of the residual that conforms to a
simplified pitch contour. The contour is obtained by estimating the pitch delay in each frame and
linearly interpolating the pitch from frame to frame. While this adds to computational complex-
ity, the result is higher voice quality per each bit transmitted.
The simplified pitch representation also leaves more bits available in each packet for sto-
chastic excitation and the channel impairment protection than would be possible if a traditional
fractional pitch approach were used. The result is enhanced error performance without degraded
speech quality at the small cost of added processing requirements.
EVRC also enhances call quality by suppressing background noise. The IS-127 [5] stan-
dard recommends a noise suppressor algorithm, but allows system designers to define their own.
This is an important factor in choosing a processing platform, making programmable DSP a
desirable choice.
The EVRC algorithm is based upon the CELP algorithm. It uses the Relaxed Code-Excited
Linear Prediction (RCELP) algorithm and thus does not match the original residual signal but
rather a time-wrapped version of the original residual signal that conforms to a simplified pitch
contour. This approach reduces the number of bits per frame that are dedicated to pitch represen-
tation, allowing additional bits to be dedicated to stochastic excitation and to channel impairment
protection. The EVRC algorithm categorizes speech into full-rate (8.55-kbps), 1/2-rate (4-kbps),
and 1/8-rate (0.8-kbps) frames that are formed every 20 ms. The EVRC algorithm offers a signif-
icant performance improvement over the IS-96A speech codec. Table 3-2 shows the performance
of the CDMA Development Group’s 13-kbps (CDG-13kbps) speech codec along with IS-96A
and EVRC codecs. The CDG-13kbps offers high voice quality but results in a decrease in chan-
nel capacity of about 40%. Fig. 3-10 shows a functional diagram of the EVRC algorithm.
Table 3-3 provides the bit allocations by packet type.
Rate 1/8
Encoding
Signal Model
Packet
Pre- Parameter
Formatting
processing Estimation
Rate 1/2
Sampled or Rate 1 Formatted
Speech Encoding Packet
Rate
Determination
External Rate
Rate Decision
Command
are many subclasses of block codes, including linear block codes, binary cyclic codes, and
Bose-Chadhusi-Hocquenghem (BCH) codes. Binary cyclic codes are also called Cyclic
Redundancy Check (CRC) codes. A BCH code is a special CRC code. BCH codes are repre-
sented by (n,k,q) where k bits are mapped into n output bits (n > k), and q is error correc-
tion capability. For example a (15,7,2) BCH code transmits 7 information bits by using a
15-bit code word, and it can correct any random errors up to two errors in the code word.
IS-95 systems use convolutional code based on the Viterbi algorithm.
Rate = 1/2 g0 c0
Constraint length K = 9
X1 X2 X3 X4 X5 X6 X7 X8
Shift Register
g1 c1
Code Symbols (output)
have indicated that, for a fixed constraint length, a decrease in the code rate from 1/2 to 1/3
results in a reduction of the required Eb/N0 of about 0.4 dB. However, the corresponding increase
in decoder complexity is about 17%. For a smaller value of code rate, the improvement in per-
formance relative to the increased decoding complexity diminishes rapidly. Eventually, a point is
reached where a further decrease in code rate is characterized by a reduction in coding gain.
The Viterbi algorithm performs maximum-likelihood decoding. It reduces the computa-
tional load by taking advantage of the special structure in coder trellis. The complexity of a Viterbi
decoder is not a function of the number of symbols in the code word sequence. The Viterbi algo-
rithm removes from consideration those trellis paths that could not possibly be candidates for the
maximum-likelihood choice. When two paths enter the same state, the one having the best metric
is selected; this path is called the surviving path. This selection of surviving paths is performed for
all the states. The decoder continues in this way to advance deeper into the trellis, making deci-
sions by eliminating the least likely paths. The major drawback of the Viterbi algorithm in that,
while error probability decreases exponentially with constraint length, the number of code
states—and consequently decoder complexity—grows exponentially with constraint length.
In IS-95, traffic data frames on uplink and downlink are fed to convolutional encoders.
Both uplink and downlink encoders use an 8-bit shift register with a constraint length of 9. The
rate of the uplink coder is 1/3—it outputs 3 bits for every input bit. At a rate below 9.6 kbps, out-
put bits are repeated to bring the number of bits in a 20-ms block to 576, for a gross rate of 28.8
kbps. The rate of the downlink encoder is 1/2—it outputs 2 bits for every input bit. At a rate
below 9.6 kbps, output bits are repeated to bring the number of bits in a 20-ms block to 384, for
a gross rate of 19.2 kbps.
EXAMPLE 3.1
Compare the error probability for a CDMA link with and without the use of error correction coding.
Assume that the uncoded transmission characteristics are: QPSK modulation, Gaussian noise, Eb/N0
= 10 dB, data rate = 9.6 kbps. For the coded case, assume the use of a (15,11) error-correcting code,
which is capable of correcting any single error pattern within a block of 15 bits. Also assume the
demodulator makes hard decisions and feeds the demodulated code bit directly to the decoder,
which in turn outputs an estimate of the original message.
Uncoded Condition
2E –6
p bu = Q --------b- = Q [ 20 ] = 4.05 × 10
N0
The probability that the uncoded message block will be received in error is
u k – 6 11 –5
P M = 1 – ( 1 – p bu ) = 1 – ( 1 – 4.05 × 10 ) = 4.455 × 10
This is the probability that at least 1 bit out of 11 is in error.
Coded Condition
9600 × 15
R c = ------------------------ = 13,091 bps
11
54 Ch. 3 • Speech and Channel Coding
E 10
-----b- = -------------------------------- = 7.333 ( 8.653 dB )
N0 ( 13.091 ⁄ 9.6 )
2E –5
pc = Q --------b- = Q [ 14.666 ] = 6.83 × 10
N0
15
15
∑
c j 15 – j
P M = ( pc ) ( 1 – pc )
2 j
The summation starts with j = 2 since the code corrects all single errors within a block of 15
bits.
P M ≈ 15 ( p c ) ( 1 – p c ) = 1.96 × 10
c 2 13 –6
2
–5
4.455 × 10
The probability of message error has improved by -----------------------------
–6
- = 22.73 due to error-correct-
ing code. 1.96 × 10
3.4 Summary
This chapter discussed the digital voice encoding systems used for both CDMA and wideband
CDMA. Conventional wireline systems transmit voice by digitizing the voice signal using PCM
at a rate of 64 kbps. While it is possible to use PCM in wireless systems, the capacity of the
wireless system is lower compared to using other digitizing methods for voice. The CDMA sys-
tem uses different approaches to digitizing the voice signal—it uses a CELP at 8 or 13.3 kbps to
digitize voice. CELP systems model the operation of the human vocal tract to efficiently code
speech. We described the operation of the CELP encoder and decoder in detail and provided a
high-level description of EVRC. Throughout the descriptions on voice coding, the goal has been
to explain the coding systems at a high level so that you can understand the operation of the sys-
tem and read the standards with some understanding of the motivation for them. If you need to
design systems or want additional information, we encourage you to read the standards.
3.5 Problems
1. Repeat Example 3.1 for Eb/N0 = 6.8 dB and a data rate of 14.4 kbps.
2. Determine the resulting output from a one-half convolutional encoder for the input 1 0
1 1 0 0 … 0 0. The left-most bit is transmitted first.
g0 = 1 + D + D2 + D3 + D5 + D7 + D8, and
g1 = 1 + D2 + D3 + D4 + D8
Assume that the encoder is initially reset (all registers are 0).
References 55
3.6 References
1. ITU Recommendation G.711.
2. Recommendation G162, CCITT Plenary Assembly, Geneva, May–June 1964, Blue Book,
Vol. 111, p. 52.
3. Skalar, B., Digital Communication—Fundamentals and Applications, Prentice Hall, Engle-
wood Cliffs, NJ, 1988.
4. TIA-IS-96A, “Speech Service Option Standard for Wideband Spread Spectrum Digital Cel-
lular System.”
5. TIA-IS-127, “Enhanced Variable Rate Codec (EVRC) 8.5 kbps Speech Coder.”
6. TIA-IS-665, “W-CDMA (Wideband Code Division Multiple Access) Air Interface Compat-
ibility Standard for 1.85–1.99 GHz PCS Applications.”
7. Ziemer, R. E., and Peterson, R. L., Introduction to Digital Communication, Macmillan Pub-
lishing Co., New York, 1992.
This page intentionally left blank
C H A P T E R 4
Diversity, Combining,
and Antennas
4.1 Introduction
In this chapter, we discuss the concepts of diversity reception where multiple signals are com-
bined to improve the SNR of the system. Time diversity is used to improve system performance
for IS-95 CDMA systems; therefore we explore that system in more detail. We then describe
various combining schemes that are used to combine the signals. Finally, we consider some
practical antennas used in the cellular telephone industry today.
57
58 Ch. 4 • Diversity, Combining, and Antennas
In principle, diversity reception techniques can be applied either at the base station or at
the mobile station, although each type of application has different problems that must be
addressed. Typically, the diversity receiver is used in the base station instead of the mobile sta-
tion. The cost of the diversity combiner can be high, especially if multiple receivers are required.
Also the power output of the mobile station is limited by its battery life. The base station, how-
ever, can increase its power output or antenna height to improve coverage to a mobile station.
Most diversity systems are implemented in the receiver instead of the transmitter since no extra
transmitter power is needed to install the receiver diversity system. Since the path between the
mobile station and the base station is assumed to be reciprocal, diversity systems implemented
in a mobile station work similarly to those in a base station.
In the forward direction, macroscopic diversity is different because the transmission origi-
nates from several sources and diversity reception is handled by one receiver in the mobile sta-
tion. All extra transmissions contribute to interference. Capacity improvement is based on a
principle similar to a RAKE receiver in a multipath channel, in which the received power-level
fluctuations tend to decrease as separable paths increase. With forward-link macroscopic diver-
sity, the RAKE receiver capability to gain from extra diversity depends also on the number of
available RAKE fingers. If the RAKE receiver is not able to collect enough energy from trans-
missions from two or, in some cases, three base stations due to a limited number of RAKE fin-
gers, the extra transmissions to the mobile station can have a negative effect on total system
capacity due to increased interference. This is most likely in the macroscopic cellular environ-
ment because the typical number of RAKE fingers considered adequate to capture the channel
energy in most cases is four. If all connections offered that amount of diversity, then the receiver
would have only one or two branches to allocate for each connection.
pointed in different directions at the receiving site and can provide signals for a combiner.
This scheme is more effective at the mobile unit than at the base station since the scatter-
ing is from local buildings and vegetation and is more pronounced at street level than at
the height of base station antennas.
Time diversity. The transmission of a symbol is spread out over time. If the identical sig-
nal is transmitted in different time slots, the received signals will be uncorrelated. This
system will work for an environment where the fading occurs independent of the move-
ment of the receiver. In a mobile radio environment, the mobile unit may be at a standstill
at a location having a weak local mean or caught in deep fade. Although fading still occurs
even when the mobile is still, the time-delayed signals are correlated and time diversity
will not reduce the fades.
Time diversity is achieved by coding, interleaving, and retransmitting. Channel coding is
applied to achieve lower power levels and required signal quality in terms of bit error rate
(BER)/FER. Interleaving and channel coding processes are used to correct errors due to channel
fades and interference peaks.
... ...
a (t ) a (t ) a (t )
X X X
... ...
Diversity Combiner
Combiner Output
diversity combiner. The receiver is called a RAKE receiver since the block diagram looks like a
garden rake.
When the CDMA systems were designed for cellular systems, the inherent wide-bandwidth
signals with their orthogonal Walsh functions were natural for implementing a RAKE receiver. In
addition, the RAKE receiver mitigates the effects of fading and is in part responsible for the
claimed 10:1 spectral efficiency improvement of CDMA over analog cellular.
In the CDMA system, the bandwidth (1.25 to 15 MHz) is wider than the coherence band-
width of the cellular or PCS channel. Thus, when the multipath components are resolved in the
receiver, the signals from each tap on the delay line are uncorrelated with each other. The
receiver can then combine them using any of the combining schemes. The CDMA system then
uses the multipath characteristics of the channel to its advantage to improve the operation of the
system (see Fig. 4-2).
The combining scheme used governs the performance of the RAKE receiver. An important
factor in the receiver design is synchronizing the signals in the receiver to match that of the
transmitted signal. Since adjacent cells are also on the same frequency with different time delays
on the Walsh codes, the entire CDMA system must be tightly synchronized.
A RAKE receiver uses multiple correlators to separately detect the M strongest multipath
components. The relative amplitudes and phases of the multipath components are found by cor-
relating the received waveform with delayed versions of the signal or vice versa. The energy in
the multipath components can be recovered effectively by combining the (delay-compensated)
multipath components in proportion to their strengths. This combining is a form of diversity and
can help to reduce fading. Multipath components with relative delays of less than ∆t = 1/Bw can-
Z1
Correlator 1
a1
Z'
Baseband Z2
∑
CDMA r (t )
Correlator 2
Signal with
Multipath a2
Components
ZM
Correlator M
aM
not be resolved and, if present, contribute to fading; in such cases forward error-correction cod-
ing and power control schemes play the dominant role in mitigating the effects of fading.
The outputs of the M correlators are denoted as Z1, Z2, …, and ZM. The weights of the out-
puts are a1, a2, …, and aΜ, respectively [10] (see Fig. 4-2). The weighting coefficients are based
on the power or the SNR from each correlator output. If the power or SNR is small from a par-
ticular correlator, it is assigned a small weighting factor. The composite signal, Z , is given by
M
Z = ∑ ak ⋅ Z k (4.1)
k=1
The weighting coefficients, ak , are normalized to the output signal power of the correlator
in such a way that the coefficients sum to unity, as shown in Eq. (4.2).
2
Zk
a k = --------------
M
- (4.2)
∑
2
Zk
k=1
In CDMA cellular/PCS systems, the forward link (BS to MS) uses a three-finger RAKE
receiver, and the reverse link (MS to BS) uses a four-finger RAKE receiver [5]. In the IS-95
CDMA system, the detection and measurement of multipath parameters are performed by a
searcher receiver, which is programmed to compare incoming signals with portions of I- and Q-
channel PN codes. Multipath arrivals at the receiver unit manifest themselves as correlation
peaks that occur at different times. A peak’s magnitude is proportional to the envelope of the
path signal. The time of each peak, relative to the first arrival, provides a measurement of the
path’s delay.
The PN chip rate of 1.2288 Mcps allows for resolution of multipath components at time
intervals of 0.814 µs. Because all of the base stations use the same I and Q PN codes, differing
only in code phase offset, not only multipath components but also other base stations are
detected by correlation (in a different search window of arrival times) with the portion of the
codes corresponding to the selected base stations. The searcher receiver maintains a table of the
stronger multipath components and/or base station signals for possible diversity combining or
for handoff purposes. The table includes time of arrival, signal strength, and the corresponding
PN code offset.
On the reverse link, the base station’s receiver assigned to track a particular mobile trans-
mitter uses the I- and Q-code times of arrival to identify mobile signals from users affiliated with
that base station. Of the mobile signals using the same I- and Q-code offsets, the searcher
receiver at the base station can distinguish the desired mobile signal by means of its unique
scrambling, long-PN-code offset, acquired before voice transmission begins on the link using a
special preamble for that purpose. As the call proceeds, the searcher receiver is able to monitor
the strengths of the multipath components from the mobile unit to the base station and to use
more than one path through diversity combining.
Basic Combining Methods 63
r ( t ) = a1 r1 ( t ) + a2 r2 ( t ) + … + a M r M ( t ) (4.3a)
M
r(t ) = ∑ ai ri ( t ) (4.3b)
i=1
Let ξi = ri2 /2Ni and ξ0 = 2P0 /2Ni , where Ni is the noise power in the ith branch.
64 Ch. 4 • Diversity, Combining, and Antennas
ξi 2
∴----- = r i ⁄ 2P 0 (4.5)
ξ0
1 ( –ξi ⁄ ξ0 )
p ( ξ i ) = ----- e (4.6)
ξ0
We assume that the signal in each branch has a constant mean; thus, the probability that
the SNR on any one branch is less than or equal to any given value ξg is
ξg ( –ξg ⁄ ξ0 )
P [ ξi ≤ ξg ] = ∫0 p ( ξ i ) dξ i = 1 – e (4.7)
Therefore, the probability that the SNRs in all branches are simultaneously less than or equal to
ξg is given by
( –ξg ⁄ ξ0 ) M
P M ( ξ g ) = P [ ξ 1, ξ 2, …, ξ M ≤ ξ g ] = [ 1 – e ] (4.8)
The probability that at least one branch will exceed the threshold SNR value of ξg is given by
The percentage of time the instantaneous output SNR ξM is below or equal to the threshold
value, ξg, is equal to P(ξM ≤ ξg). We plot results for M = 1, 2, and 4 in Fig. 4-3. Note that the larg-
est gain occurs for the two-branch combiner. By differentiating Eq. (4.8) we get the probability
density function
( –ξg ⁄ ξ0 ) M – 1 ( –ξg ⁄ ξ0 )
p M ( ξg ) = ( M ⁄ ξ0 ) [ 1 – e ] e (4.10)
ξg ( –ξg ⁄ ξ0 ) M – 1 ( –ξg ⁄ ξ0 )
∫0 M ----
- [ 1 – e
∞
ξM = ] e dξ g (4.11)
ξ 0
ξM ∞ –x M – 1 –x
∴------ = M ∫0 x [ 1 – e ] e dx (4.12)
ξ0
–x –x
Substituting y = 1 – e or x = – ln ( 1 – y ) ; then dy = e dx
∞
ξM 1
∴------ = M ∫0 [ – ln ( 1 – y ) ]y ∑ ∫0 ---K- y
1 M–1 1 M+K–1
dy = M dy (4.13)
ξ0
K=1
Basic Combining Methods 65
1E+00
1E-01
M=1
1E-02 M=2
Probability
M=4
1E-03
1E-04
1E-05
-40 -35 -30 -25 -20 -15 -10 -5 0 5 10
M
ξM 1
∴------ =
ξ0 ∑ ---K- (4.14)
K=1
Table 4-1 shows that the mean SNR increases slowly with M.
∑ ∑ ai a j ni ( t )n j ( t )
2
ni ( t ) = (4.16)
j = 1i = 1
66 Ch. 4 • Diversity, Combining, and Antennas
ξM ξ
------ 10 log -----M-
M ξ0 ξ0
1 1.000 0.000
2 1.500 1.761
3 1.833 2.632
4 2.083 3.187
5 2.283 3.585
6 2.450 3.892
∑ ai ni ( t ) = 2 ∑ ai N i
2 2 2
NT = (4.17)
i=1 i=1
where
2
n i ( t ) = 2N i (4.18)
The SNR at the output is given as
M 2
∑ ai ri ( t )
1 i=1
ξ M = --- ----------------------------
- (4.19)
2 M
∑ ai N i
2
i=1
We want to maximize ξM. This can be done by using the Schwartz inequality.
M 2 M M
∑ ai ri ≤ ∑ ∑ ai
2 2
ri (4.20)
i=1 i=1 i=1
If a i = r i ⁄ N i , then
M M 2
ri
∑ ri ∑ -----
2
1 =1 i=1 i N
ξM = --- i----------------------------
M
- (4.21)
2
∑ ri
2
i=1
M 2 M
1 r
∴ξ M = --- ∑ -----i = ∑ ξi (4.22)
2 Ni
i=1 i=1
Basic Combining Methods 67
Thus, the SNR at the combiner output equals the sum of the SNR of the branches.
M M
ξM = ∑ ξi = ∑ ξ0 = Mξ 0 (4.23)
i=1 i=1
ξM
∴------ = M (4.24)
ξ0
The probability density function of the combiner output SNR is given by
ξM
– -------
M – 1 ξ0
ξM e
p(ξM ) = ---------------------------
M
- , ξM ≥ 0 (4.25)
ξ 0 ( M – 1 )!
The probability that ξM ≤ ξg is given by
ξ----g-
K–1
ξg
– ----- M
ξ0 ξ 0
P ( ξ M ≤ ξg ) = 1 – e ∑ --------------------
( K – 1 )!
(4.26)
K=1
ξ----g-
K–1
ξg
– ----- M
ξ0 ξ 0
P ( ξ M > ξg ) = e ∑ --------------------
( K – 1 )!
(4.27)
K=1
∑ ri
1 i=1
ξM = --- -------------------
- (4.29)
2 M
∑ Ni
i=1
If we assume that the mean noise power in each branch is the same (i.e., N), then Eq.
(4.29) becomes
68 Ch. 4 • Diversity, Combining, and Antennas
1E+00
1E-01
M=1
1E-02
M=2
Probability
M=4
1E-03
1E-04
1E-05
-40 -35 -30 -25 -20 -15 -10 -5 0 5 10
10log (ξg /ξ )
0
M 2 M
1 1
ξ M = -------------
2NM ∑ ri = -------------
2NM ∑ r j ri (4.30)
i=1 j, i = 1
2 πP
but r i = 2P 0 ; and r i = --------0- .
2
Since the various branch signals are uncorrelated, r j r i = r i r j = r i r j , for i not equal to j.
Therefore Eq. (4.30) will be
1 πP 0 π
ξ M = ------------- 2MP 0 + M ( M – 1 ) --------- = ξ 0 1 + ( M – 1 ) --- (4.31)
2NM 2 4
ξM π
------ = 1 + ( M – 1 ) --- (4.32)
ξ0 4
Basic Combining Methods 69
1E+00
1E-01
1E-02
M=2
Probability
1E-03
1E-05
-40 -35 -30 -25 -20 -15 -10 -5 0 5 10
10log (ξg /ξ )
0
1E+00
1E-01
M=1
M=2 M=4
1E-02
All
Probability
1E-03
Selection
Selection Maximal
Maximal Ratio
Ratio
1E-04
Equal Gain
1E-05
-50 -40 -30 -20 -10 0 10 20
2E
p BPSK = Q --------b- (4.34)
N0
The bit error probabilities over M-branch diversity with selection, equal-gain, and maximal-
ratio combining are given as [5]
• Selection combining
M–1
M ( –1 )
k
M – 1 ⋅ ------------ ρc
p BPSK, M = -----
2 ∑ K k+1
- ⋅ 1 – -----------------------
k + 1 + ρc
(4.35)
k=0
• Equal-gain combining
M–1
∑
M M + k – 1 k
p BPSK, M = ( p BPSK ) ⋅ ⋅ ( 1 – p BPSK ) (4.36)
k
k=0
• Maximal-ratio combining
1 M
2M – 1 -------
p BPSK, M ≈ ⋅ - (4.37)
M 4ρ c
Eb
where ρ c = ---------------
- = average SNR per diversity branch
N0 ⋅ M
ρc
p BPSK = 1--- ⋅ 1 – ---------------
2 1 + ρ c
EXAMPLE 4.1
Compare the bit error performance of BPSK modulation having SNR =10 dB with 2-branch diver-
sity using selection, equal-gain, and maximal-ratio combining.
• Selection combining
1 k
1 ( – 1 )-
∑ k ⋅ ------------
10 1
p BPSK, 2 = ⋅ 1 – ------------------------ = [ 1 – 0.95346 ] – --- [ 1 – 0.91287 ] = 0.002976
k+1 k + 1 + 10 2
k=0
72 Ch. 4 • Diversity, Combining, and Antennas
• Equal-gain combining
∑ 1 +k k ⋅ ( 1 – 0.02327 )
2 k
p BPSK, 2 = ( 0.02327 ) ⋅ = 0.002153
k=0
• Maximal-ratio combining
2
p BPSK, 2 ≈ ⋅ --------------- = 0.001875
3 1
2 4 × 10
The bit error performance of equal-gain and selection combining is about 15% and 59%
worse than the maximal-ratio combining, respectively (see Table 4-4).
λ/4 λ/4
Feed Line
• Antenna pattern. Closely related to the gain of the antenna is the antenna pattern. As
gain is increased, the beam width is decreased. This can be an advantage or a disadvan-
tage depending on the antenna orientation and the needs of the system design.
• Bandwidth. The antenna must operate over the full range of frequencies in use for the
cellular or PCS system. If the antenna bandwidth is small, channels at the edge of the
band may not receive signals as well as those near the band center.
• Gain. The higher the gain of the antenna, the lower the power that is necessary at the
transmitter. Since the antenna is purchased once and the transmitter power is purchased
continuously, high-gain antennas save money by using less electricity, thus conserving
the natural resources used to create the electricity.
• Ground plane. Some antennas must be mounted above a reflecting surface to function
correctly. For example, a quarter-wave antenna is one-half of a dipole and requires that
the other half of the dipole be developed by a mirror image below a ground plane. This
can be used to advantage in designing antennas for vehicles, but it is a disadvantage
when base station antennas, which are high above the surface of the earth, are
designed.
• Height. The higher the antenna, the better the coverage of the system. However, if the
coverage of the system is too good, interference from other cells may become trouble-
some. In an interference-limited system, all levels scale equally so that, at the first
order, there will not be a problem. However, since radio wave propagation is statistical,
there may be locations where good propagation exists from a point far removed from a
base station. The higher the base station antenna, the more likely that these anomalous
events will occur.
• Input impedance. Most cables used as feed line from the transmitter/receiver to the
antenna are either 50 ohms or 72/75 ohms. If the input impedance of the antenna is far
removed from either of these values, it will be difficult to get the antenna to accept the
power delivered to it and its efficiency η will be low.
• Mechanical rigidity. If the antenna flexes in the wind, it will introduce an additional
fading component to the received signal. Ultimately, the continuous flexing will cause
metal fatigue and mechanical failure of the antenna.
• Polarization. For wireless cellular and PCS communications, a vertical antenna is the
easiest to mount on a vehicle; therefore vertical polarization has been standardized. In
general, horizontal or vertical polarization works equally well.
With this background, we will examine some simple antennas that are used for base and
mobile operation.
antenna has an omnidirectional pattern [6], the quarter-wave vertical has an omnidirectional
pattern. The gain of the antenna is the same as that of a dipole (0 dB dipole [dBd] or 2.1 isotro-
pic dipole [dBi]). The impedance of a quarter-wave vertical is 36.5 ohms and requires a match-
ing transformer for proper feeding of the antenna.
λ/4
Antenna
λ/2
λ/2
λ/2
λ/2
λ/2
λ/2
λ/2
λ/4
Antenna
λ/4
Ground Plane
Image of Antenna
Reflector
Antenna
Reflected
Mobile Rays
2
Spot Beam on
a Handset
Antenna Elements
To Transmitter
or Receiver
Figure 4-13 Adaptive Array Smart Antenna
78 Ch. 4 • Diversity, Combining, and Antennas
system can provide some additional gain by suppressing interferers further. However, since there
are so many interferers, the additional gain may not be worth the complexity.
4.7 Summary
In this chapter we considered the role of antennas in the wireless system. We also presented the
concepts of diversity reception where multiple signals are combined to improve the SNR of the
system.
4.8 References
1. Garg, V. K., and Wilkes, J. E., Wireless and Personal Communications Systems, Prentice
Hall, Upper Saddle River, NJ, 1996.
2. Halpern, S. W., “The Theory of Operation of an Equal-Gain Predication Regenerative Diver-
sity Combiner with Rayleigh Fading Channel,” IEEE Transactions on Communication Tech-
nology, COM-22 (8), August 1974, pp. 1099–106.
3. Kahn, L. R., “Radio Squarer,” Proceedings of the IRE 42, November 1954, p. 1704.
4. Kraus, J. D., Antenna, McGraw-Hill, New York, 1988.
5. Lee, J. S., and Miller, L. E., CDMA Systems Engineering Handbook, Artech House, Boston,
1998.
6. Lee, W. C. Y., “Antenna Spacing Requirements for a Mobile Radio Base Station Diversity,”
Bell System Technical Journal 50(6), July–August 1971.
7. Liberti, J. C. Jr., and Rappaport, T. S., Smart Antennas for Wireless Communications, Pren-
tice Hall, Upper Saddle River, NJ, 1999.
8. Mahrotra, A., Cellular Radio Performance Engineering, Artech House, Boston, 1994.
9. Price, R., and Green, P. E. Jr., “A Communication Technique for Multipath Channels,” Pro-
ceedings of the IRE 46, March 1958, pp. 555–70.
10. Rappaport, T. S., Wireless Communications: Principle and Practice, Prentice Hall, Upper
Saddle River, NJ, 1996.
11. Special Issue on Smart Antennas, IEEE Personal Communications 5(1), February 1998.
C H A P T E R 5
IS-95 System
Architecture
5.1 Introduction
A wireless system—whether for cellular operation (Band Class 0), i.e., 850-MHz band, or for
PCS operation (Band Class 1), i.e., 1.8-GHz band—must support communication with the
mobile station and interact with the Public-Switched Telephone Network (PSTN). As the mobile
station changes its location during a call, the wireless system must insure that the connection
between the mobile station and the PSTN is maintained.
A wireless system consists of discrete logical components. These components may be dis-
crete physical entities or they may be physically located with another logical entity. These func-
tional entities must interact in order to coordinate operation. Such interaction is achieved by
messaging over interfaces between two entities. If two functional entities are physically separate
and if the interface is standardized, the service provider can purchase products from different
manufacturers. However, successful operation is not guaranteed since the associated standard
often does not cover all facets of operation. Manufacturers need to cooperate to eliminate differ-
ences that jeopardize proper interaction.
This chapter first will cover the functional entities of the wireless network and the inter-
faces between the entities that have been standardized by the wireless communication industry.
Then it examines the activities of the International Telecommunication Union (ITU) to add Intel-
ligent Network (IN) to wireless systems.
79
80
OS AUX IWF
PSPDN Rx
TE2
WPT0 O X L
Pi
Base Station
how mobility is handled. Mobility is the capability for users to place and receive calls in systems
tioned differently between the models. The main difference between the two reference models is
TR-45/TR-46 Reference Model 81
other than their home system. In the T1P1 reference model, the user data and the terminal data
are separate; thus, users can communicate with the network via different mobile stations. In the
TR-45/46 reference model, only terminal mobility is supported. A user can place or receive calls
at only one terminal (the one the network has identified as owned by the user). The T1P1 func-
tionality is migrating toward independent terminals and user mobility, but all aspects of it are not
currently supported. We also discuss a Wireless Intelligent Network (WIN) architecture and ref-
erence model that overcomes some of the mobility problems in the current architecture.
The main elements of the reference model are
• Mobile Station (MS). The MS terminates the radio path on the user side and enables the
user to gain access to services from the network. The MS can be a stand-alone device or
can have other devices (e.g., personal computers, fax machines) connected to it.
• Base Station (BS). The BS terminates the radio path and connects to the Mobile
Switching Center (MSC). The BS is often segmented into the BTS and the BSC.
◆ Base Transceiver System (BTS). The BTS consists of one or more transceivers
placed at a single location and terminates the radio path on the network side. The
BTS may be co-located with a BSC or may be independently located.
◆ Base Station Controller (BSC). The BSC is the control and management system
for one or more BTSs. The BSC exchanges messages with both the BTS and the
MSC. Some signaling messages may pass through the BSC transparently.
• Mobile Switching Center (MSC). The MSC is an automatic system that interfaces the
user traffic from the wireless network with the wireline network or other wireless net-
works. The MSC functions as one or more of the following:
◆ Anchor MSC: first MSC providing radio contact in a call
◆ Border MSC: an MSC controlling BTSs adjacent to the location of a mobile
station
◆ Candidate MSC: an MSC that could possibly accept a call or a handoff
◆ Originating MSC: the MSC directing an incoming call toward a mobile station
◆ Remote MSC: the MSC at the other end of an intersystem handoff trunk
◆ Serving MSC: the MSC currently providing service to a call
◆ Tandem MSC: an MSC providing only trunk connections for a call in which a
handoff has occurred
◆ Target MSC: the MSC selected for a handoff
◆ Visited MSC: an MSC providing service to the mobile station
• Home Location Register (HLR). The HLR is the functional unit that manages mobile
subscribers by maintaining all subscriber information (e.g., electronic serial number,
directory number, international mobile station identification, user profiles, current loca-
tion). The HLR may be co-located with an MSC as an integral part of the MSC or may
be independent of the MSC. One HLR can serve multiple MSCs, or an HLR may be
distributed over multiple locations.
82 Ch. 5 • IS-95 System Architecture
• Data Message Handler (DMH). The DMH is used to collect billing data.
• Visited Location Register (VLR). The VLR is linked to one or more MSCs and is the
functional unit that dynamically stores subscriber information (e.g., the user’s elec-
tronic serial number [ESN], directory number, user profile information) obtained from
the user’s HLR when the subscriber is located in the area covered by the VLR. When a
roaming MS enters a new service area covered by an MSC, the MSC informs the asso-
ciated VLR about the MS by querying the HLR after the MS goes through a registration
procedure.
• Authentication Center (AC). The AC manages the authentication or encryption infor-
mation associated with an individual subscriber. The AC may be located within an HLR
or MSC or may be located independently of both.
• Equipment Identity Register (EIR). The EIR provides information about the mobile
station for record purposes. The EIR may be located within an MSC or may be located
independently of it.
• Operations System (OS). The OS is responsible for overall management of the wire-
less network.
• Interworking Function (IWF). The IWF enables the MSC to communicate with other
networks.
• External Networks. These are other communications networks—the Public-Switched
Telephone Network (PSTN), the Integrated Services Digital Network (ISDN), the Pub-
lic Land Mobile Network (PLMN), and the Public-Switched Packet Data Network
(PSPDN).
The following interfaces are defined between the various elements of the system:
• BS to MSC (A-Interface). This interface between the base station and the MSC sup-
ports signaling and traffic (both voice and data). A-Interface protocols have been
defined using SS7, ISDN BRI/PRI, and frame relay transport (TIA IS-634).
• BTS-to-BSC Interface (Abis). If the base station is segmented into a BTS and BSC,
this internal interface is defined.
• MSC-to-PSTN Interface (Ai). This interface is defined as an analog interface using
either Dual-Tone Multifrequency (DTMF) signaling or Multifrequency (MF) signaling.
• MSC to VLR (B-Interface). This interface is defined in the TIA IS-41 protocol speci-
fication [8].
• MSC to HLR (C-Interface). This interface is defined in the TIA IS-41 protocol speci-
fication [8].
• HLR to VLR (D-Interface). This interface is the signaling interface between an HLR
and a VLR and is based on SS7. It is currently defined in the TIA IS-41 protocol speci-
fication [8].
• MSC to ISDN (Di-Interface). This is the digital interface to the PSTN and is a T1
interface (24 channels of 64 kbps) and uses Q.931 signaling.
Functional Model Based on Reference Model 83
• MSC-MSC (E-Interface). This interface is the traffic and signaling interface between
wireless networks. It is currently defined in the TIA IS-41 protocol specification.
• MSC to EIR (F-Interface). Since the EIR is not yet defined, the protocol for this inter-
face is not defined.
• VLR to VLR (G-Interface). When communication is needed between VLRs, this
interface is used. It is defined by TIA IS-41.
• HLR to AC (H-Interface). The protocol for this interface is not defined.
• DMH to MSC (I-Interface). The protocol for this interface is defined in the IS-124
[9].
• MSC to IWF (L-Interface). This interface is defined by the interworking function.
• MSC to PLMN (Mi-Interface). This interface is to another wireless network.
• MSC to OS (O-Interface). This is the interface to the OS. It is currently being defined
in ATIS standard body T1M1.
• MSC to PSPDN (Pi-Interface). This interface is defined by the packet network that is
connected to the MSC.
• Terminal Adapter (TA) to Terminal Equipment (TE) (R-Interface). These inter-
faces are specific for each type of terminal connected to an MS.
• ISDN to TE (S-Interface). This interface is outside the scope of PCS and is defined
within the ISDN system.
• BS to MS (Um-Interface). This is the air interface.
• PSTN to DCE (W-Interface). This interface is outside the scope of PCS and is defined
within the PSTN system.
• MSC to AUX (X-Interface). This interface depends on the auxiliary equipment con-
nected to the MSC.
• BS Management Application Part (BSMAP). Message sent between BS and MSC.
• Direct Transfer Application Part (DTAP). Message sent between MS and MSC.
• Service Switching Function (SSF)/ Call Control Function (CCF) FE. The SSF/CCF
FE is contained in SSP and provides interfaces to operator services, E911, international
calls, and network repair/maintenance centers. Physical interfaces for this collection
include: to the RS, to the mobility management platform, to the internal peripheral (IP),
and to other SSPs and external networks.
TMD
PMD FE6
To other FE5
RACFs SCF SDF
TMD
PMD
FE3
RACF SRF
FE7
RASC
FE4
FE1 FE2 SSF FE4 SSF
RT RT PSC PSC
RPT RPI
RPC
CCAF
FE9
CCAF: Call Control Agent Function RPT: Radio Port Terminal Transport & Signaling
CCF: Call Control Function RT: Radio Terminal Signaling Relationship
PMD: Personal Mobility Data SCF: Service Control Function Air Interface
PSC: Personal Switching Center SDF: Service Data Function
RACF: Radio Access Control Function SRF: Specialized Resource Function
RASC: Radio Access System Control SSF: Service Switching Function
RCF: Radio Control Function TMD: Terminal Mobility Data
RPI: Radio Port Interface
Other Platform
Other SDF
RACFs
SCF
MMAP
Interface
SCP/HLR/VLR SRF
RACF
IP
RTF SSF CCF
RCF
Other
SSP SSPs
SU
RS
• The Bearer Control Function (BCF) provides those bearer functions needed to process
handoffs. A common example of this is a conference bridge to support soft handoffs.
• The Bearer Control Function for the radio bearer (BCFr) provides the functions
necessary to select bearer functions and radio resources. It also detects and responds to
pages from the network and performs handoff processing. Some example bearer func-
tions are PCM voice, ADPCM voice, packet data, and circuit-switched data.
• The Call Control Function-Enhanced (CCF') provides the call and connection con-
trol in the network. For example, it establishes, maintains, and releases call instances
requested by the CCAF'; provides IN triggers to the SSF; controls bearer connection
elements in the network.
86 Ch. 5 • IS-95 System Architecture
• The Service Access Control Function (SACF) provides the network side of mobility
management functions. Some examples are registration and location of the mobile station.
• The Service Control Function (SCF) contains the service and mobility control logic
and call processing to support the functions of a mobile terminal.
SDF
Mobile Side Network Side
SSF
BCAF BCFr
Mobile
MRRC RRC Radio Resource Control
Radio Resource Control
Mobile
Radio Frequency
Radio
MRTR RFTR Transmission
Transmission
and Reception
and Reception
• The Service Data Function (SDF) provides data storage and data access in support of
mobility management and security data for the network.
• The Specialized Resource Function (SRF) provides the specialized functions needed
to support execution of IN services. Some examples are dialed digit receivers, confer-
ence bridges, and announcement generators.
• The Service Switching Function (SSF) provides the functions required for interaction
between the CCF' and the SCF. It supports extensions of the CCF' logic to recognize
IN triggers and interact with the SCF. It manages the signaling between the CCF' and
the SCF and modifies functions in the CCF' to process IN services under control of the
SCF.
• The Terminal Access Control Function (TACF) provides control of the connection
between the mobile station and the network. It provides paging of mobile stations, page
response handling, handoff decision, and completion. It also provides trigger access to
IN functionality.
On the mobile side, the following functional elements are defined:
• The Bearer Control Agent Function (BCAF) establishes, maintains, modifies, and
releases bearer connections between the mobile station and the network.
• The Call Control Agent Function-Enhanced (CCAF') supports the call processing
functions of the mobile station.
• The Mobile Control Function (MCF) supports the mobility management functions of
the mobile station.
• The Terminal Access Control Agent Function (TACAF) provides the functions nec-
essary to select bearer functions and radio resources. It also detects and responds to
pages from the network and performs handoff processing.
• The Terminal Identification Management Function (TIMF) stores the terminal-
related security information. It provides terminal identification to other functional ele-
ments and provides the terminal authentication and cryptographic calculations.
• The User Identification Management Function (UIMF) provides user-related secu-
rity information similar to the TIMF.
Both the TIMF and the UIMF can be stored in either the mobile station or a separate secu-
rity module often implemented in a smart card.
The radio resource control plane (Fig. 5-5) is responsible for assigning and supervising
radio resources. Four function entities (two on the mobile side and two on the network side) per-
form the functions of the radio access subsystem.
• The Radio Resource Control (RRC) provides functionality in the network to select
radio resources (channels, spreading codes, etc.), make handoff decisions, control the
RF power of the mobile station and provide system information broadcasting.
• The Radio Frequency Transmission and Reception (RFTR) provides the network
side of the radio channel. It provides the radio channel encryption and decryption (if
88 Ch. 5 • IS-95 System Architecture
used) and channel quality estimation (data error rates for digital channels), sets the RF
power of the mobile station, and detects when the mobile station accesses the system.
• The Mobile Radio Resource Control (MRRC) processes the mobile side of the radio
resource selection. It provides base station selection during start-up, mobile-assisted
handoff control, and system access control.
• The Mobile Radio Transmission and Reception (MRTR) provides the mobile side of
the radio channel and performs functions similar to RFTR.
The two control planes interact to provide services to the mobile station and the network.
The TR-46 PCS network reference model working group has generated a simplified ver-
sion of the ITU model and has explicitly shown the operations functions on the model. The IN
Function Reference Model for PCS (Fig. 5-6) has many of the functional elements with the same
name as those of the ITU model. The differences are that
• The Radio Terminal Function (RTF) contains all functionality of the mobile side of
the reference model.
• The Radio Access Control Function (RACF) is similar to the SACF and provides
mobility management functions.
SDF
RACF SCF
SSF
to other FEs
CCAF
SMF
• The Radio Control Function (RCF) provides the capabilities of the TACF, the BCFr,
and the BCF in the ITU model. It provides the radio ports and the radio port controller
capabilities in the PCS network.
• The Call Control Agent Function (CCAF) provides access to the wireless network by
wireline users.
• The Service Management Function (SMF) provides the network management func-
tions for each functional element.
With the ITU reference model, the functionality to support all of the features and capabili-
ties for a wireless network can be partitioned into different functional elements and still meet the
variety of national and worldwide standards. Therefore no exact partitioning of the functions of
the network reference models can be made. We encourage you to examine the standards and
implementations of the various manufacturers for partitioning examples.
Around the world, two common mobile application parts (MAP) are used. In GSM sys-
tems deployed worldwide, the GSM MAP is used. In the systems that were originally deployed
in the United States, the IS-41 MAP is used. The use of two different MAPs makes roaming
between the two systems difficult. The use of the IN application part with enhancements will
offer the opportunity for a common MAP for all mobile and wireline services.
5.5 Summary
This chapter presented the TR-45/46 reference model, which is used as the basis by standards
committees. The main elements of this model are the Mobile Station (MS), Base Station (BS),
Mobile Switching Center (MSC), Home Location Register (HLR), and Visited Location Regis-
ter (VLR). Next we discussed the MSC-BS interface (TIA IS-634), which standardizes the mes-
saging between the base station and the MSC. Messages between the BS and the MSC are
categorized into two types: Base Station Application Part (BSAP) and Direct Transfer Applica-
tion Part (DTAP). Messages can be associated with the functions of call processing and supple-
mentary services, radio resource management, mobility management, and terrestrial facility
management. The effects of a CDMA system upon the architecture are emphasized. Finally, we
focused on the concepts of wireless intelligent networking. Current systems have difficulty with
roaming because of the support of two MAPs in the world (GSM and IS-41). With wireless
intelligent networking and extensions to the IN MAP, true worldwide roaming may become pos-
sible once a common frequency band is available.
5.6 References
1. American National Standards Institute, Inc., “Signaling System No. 7 (SS7)—Message
Transfer Part (MTP),” ANSI T1.111-1992, June 1992.
2. American National Standards Institute, Inc., “Signaling System No. 7 (SS7)—Signaling
Connection Control Part (SCCP),” ANSI T1.112-1992, June 1992.
90 Ch. 5 • IS-95 System Architecture
3. American National Standards Institute, Inc., “Synchronization Interface Standards for Digi-
tal Networks,” 1087, ANSI T1.101-1987, March 1987.
4. Bellcore, “Advanced Intelligent Network (AIN) Release 1 Switching System Generic
Requirements,” TA-NWT-001123, Issue 1, May 1991.
5. Committee T1, “Stage 2 Service Description for Circuit Mode Switched Bearer Services,”
Draft T1.704.
6. Committee T1—Telecommunications, “A Technical Report on Network Capabilities, Archi-
tectures, and Interfaces for Personal Communications,” T1 Technical Report #34, May
1994.
7. ITU Study Group 11, “Version 1.1.0 of Draft New Recommendation Q.FNA, Network
Functional Model for FPLMTS,” Document Q8/TYO-50, September 15, 1995.
8. TIA Interim Standard, IS-41 C, “Cellular Radiotelecommunications Intersystem Opera-
tions,” January 1996.
9. TIA IS-124, “Cellular Radio Telecommunications Intersystem Non-Signaling Data Message
Handlers (DMH),” 1994.
10. TIA IS-634, “MSC-BS Interface for Public 800 MHz,” Revision 0, 1995.
11. TIA SP-2977, “Cellular Features Description,” Prepublication Version, March 14, 1995.
12. TIA TR-45 Reference Model, 1990.
13. TIA TR-46 Reference Model, 1991.
C H A P T E R 6
6.1 Introduction
This chapter provides a high-level description of the IS-95 CDMA air interface. The intent of
this chapter is to lay a foundation for the system details given in chapters 7–11. We describe
important aspects of the forward link (base station to mobile) and reverse link (mobile to base
station) and include modulation parameters for the channels.
* The frequency spectrum for the A-System cellular service provider is split such that the spectrum is not divisible by
1.25 MHz. Thus, the A-System cellular provider cannot partition the spectrum into 10 1.25-MHz CDMA channels.
This restriction is not imposed for the B-System, however.
91
92 Ch. 6 • IS-95 CDMA Air Interface
Modulation and coding details for the reverse link and forward link channels differ. Pilot
signals are transmitted by each cell to assist the mobile radio in acquiring and tracking the cell
site forward link signals. The strong coding helps these radios to operate effectively at Eb /N0
ratio of 5- to 7-dB range.
W0 W32 W1 W7 W8 W 63
FTCH with One Code Channel FTCH with Multiple Code Channels
Table 6-1 Modulation and Coding Features of the IS-95 CDMA System
Modulation Quadrature Phase-Shift Keying (QPSK)
Chip rate 1.2288 Mcps
Nominal data rate (RS1) 9600 bps
Filtered bandwidth 1.23 MHz
Coding convolution with Viterbi decoding
Interleaving with 20-ms span
The CDMA system uses power control and voice activation to minimize mutual interfer-
ence. Voice activation is provided by using a variable-rate vocoder that operates at a maximum
rate of 8 kbps to a minimum rate of 1 kbps for Rate Set 1 (RS1), depending on the level of voice
activity. With the decreased data rate, the power control circuits reduce the transmitter power to
achieve the same bit error rate. A precise power control, along with voice activation circuits, is
critical to avoid the excessive transmitter signal power responsible for contributing the overall
interference in the system. A coding algorithm at 13.3 kbps for RS2 is also supported.
A time interleaver with a 20-ms span is used with error-control coding to overcome rapid
multipath fading and shadowing. The time span used is the same as the time frame of the voice
compression algorithm.
The CDMA radio uses a RAKE receiver to take advantage of a multipath delay greater
than 1 µs, which occurs commonly in cellular/PCS networks in urban and suburban areas.
systems support RS1 on the forward traffic channels. RS2 is optionally supported on the forward
traffic channels. When a radio system supports a rate set, it supports all four elements of the set.
Speech is encoded using a variable-rate vocoder to generate forward-traffic-channel data
depending on voice activity. Since the frame duration is fixed at 20 ms, the number of bits per
frame varies according to the traffic rate. Half-rate convolutional encoding is used, which dou-
bles the traffic rate to give rates from 2400 to 19,200 symbols per second. Interleaving is per-
formed over 20 ms. A long code of 242 – 1 (= 4.4 × 1012) is generated containing the user’s ESN
embedded in the MS long code mask (with voice privacy, the MS long-code mask does not use
the ESN). The scrambled data is multiplexed with power control information that steals bits
from the scrambled data. The multiplexed signal remains at 19,200 bps and is changed to 1.2288
Mcps by the Walsh code Wi assigned to the ith user traffic channel (TCH). The signal is spread at
1.2288 Mcps by pilot quadrature pseudorandom binary sequence signals, and the resulting
quadrature signals are then weighted. The power level of the traffic channel depends on its data
transmission rate.
The paging channels (PCH) provide the mobile stations with system information and
instructions, in addition to acknowledging messages following access requests on the mobile
stations’ access channels. The paging channel data is processed in a manner similar to the traffic
channel data. However, there is no variation in the power level on a per-frame basis. The 42-bit
mask is used to generate the long code. The paging channel operates at a data rate of 9600 or
4800 bps.
All 64 channels are combined to give single I and Q channels. The signals are applied to
quadrature modulators and the resulting signals are summed to form a QPSK signal, which is
linearly amplified.
The pilot CDMA signal transmitted by a base station provides a reference for all mobile
stations. It is used in the demodulation process. The pilot signal level for all base stations is about
4 to 6 dB higher than the traffic channel with a constant value. The pilot signals are quadrature
pseudorandom binary sequence signals with a period of 32,768 chips. Since the chip rate is
1.2288 Mcps, the pilot pseudorandom binary sequence corresponds to a period of 26.66 ms,
which is equivalent to 75 pilot channel code repetitions every 2 seconds. The pilot signals from
all base stations use the same pseudorandom binary sequence, but each base station is identified
by a unique time offset of its pseudorandom binary sequence. These offsets are in increments of
64 chips, providing 511 unique offsets relative to 0 offset code. These large numbers of offsets
ensure that unique base station identification can be obtained, even in dense microcellular envi-
ronments.Tables 6-2 through 6-5 provide modulation parameters for the forward link channels.
A mobile station processes the pilot channel to find the strongest signal components. The
processed pilot signal provides an accurate estimation of time delay and the phase and magni-
tude of the three multipath components. These components are tracked in the presence of fast
fading, and coherent reception with combining is used. The chip rate on the pilot channel and on
all channels is locked to precise system time, e.g., by using the Global Positioning System
(GPS). Once the mobile station identifies the strongest pilot offset by processing the multipath
components from the pilot channel correlator, it examines the signal on its sync channel which is
TIA IS-95 CDMA System 95
locked to the pseudorandom binary sequence signal on the pilot channel. Since the sync channel
is time aligned with its base station’s pilot channel, the mobile station finds the information per-
tinent to this particular base station on the sync channel. The sync channel message contains
time of day and long-code synchronization to ensure that long-code generators at the base sta-
tion and mobile station are aligned and identical. The mobile station now attempts to access the
paging channel and listens for system information. The mobile station enters the idle state when
it has completed acquisition and synchronization. It listens to the assigned paging channel and is
able to receive and initiate the calls. When informed by the paging channel that voice traffic is
available on a particular channel, the mobile station recovers the speech data by applying the
inverse of the spreading procedures.
an access number, a paging channel number associated with the access channel, and other sys-
tem data. Each mobile station uses a different PN code; therefore the radio system can correctly
decode the information from an individual mobile station. Data transmitted on the reverse chan-
nel is grouped into 20-ms frames. All data on the reverse channel is convolutionally encoded,
block interleaved, and modulated by modulation symbols transmitted for each 6 code symbols.
The modulation symbol is one of the 64 mutually orthogonal waveforms that are generated
using Walsh functions.
The reverse traffic channel may use either 9600-, 4800-, 2400-, or 1200-bps data rates for
transmission. The duty cycle for transmission varies proportionally with data rate, being 100%
at 9600 bps and dropping to 12.5% at 1200 bps. An optional second rate set is also supported in
the PCS version of CDMA and new versions of cellular CDMA (see chapter 7 for details). The
actual burst transmission rate is fixed at 28,800 code symbols per second. Since 6 code symbols
are modulated as one of 64 modulation symbols for transmission, the modulation symbol trans-
mission rate is fixed at 4800 modulation symbols per second. This results in a fixed Walsh chip
rate of 307.2 kilo-chips per second (kcps). The rate of spreading PN sequence is fixed at 1.2288
Mcps, so that each Walsh chip is spread by 4 PN chips. Table 6-6 provides the signal rates and
Table 6-6 CDMA Reverse Traffic Channel Modulation Parameters for RS1
Parameter 9600 bps 4800 bps 2400 bps 1200 bps units
PN chip rate 1.2288 1.2288 1.2288 1.2288 Mcps
Code rate 1/3 1/3 1/3 1/3 bits per code sym
Transmitting 100 50 25 12.5 %
duty cycle
Code symbol 1 2 4 8 repeated code symbol
repetition per code symbol
Code symbol rate 3 × 9600 = 28,800 28,800 28,800 28,800 sps
Modulation 6 6 6 6 code symbol per mod.
symbol
Modulation 28,800/6 = 4800 4800 4800 4800 sps
symbol rate
Walsh chip rate 64 × 4800 = 307.2 307.2 307.2 307.2 kcps
Mod. symbol 1/4800 = 208.33 208.33 208.33 208.33 µs
duration
PN chips per 12,288/288 = 42.67 42.67 42.67 42.67 PN chips per code
code symbol symbol
PN chips per 1,228,800/4800 = 256 256 256 256 PN chips per mod.
mod. symbol symbol
PN chips per 4 4 4 4 PN chips per Walsh
Walsh chip chip
98 Ch. 6 • IS-95 CDMA Air Interface
their relationship for the various transmission rates on the reverse traffic channel for RS1.
Reverse traffic channel modulation parameters for RS2 are given in Table 6-7.
Following the orthogonal spreading, the reverse traffic channel and access channel are
spread in quadrature. Zero-offset I and Q pilot PN sequences are used for spreading. These
sequences are periodic with 215 chips (32,768 PN chips in length) and are based on characteristic
polynomials gI (x) and gQ (x).
15 13 9 8 7 5
gI ( x ) = x + x + x + x + x + x + 1 (6.1)
15 12 11 10 6 5 4 3
gQ ( x ) = x + x + x + x + x + x + x + x + 1 (6.2)
The maximum-length linear feedback register sequences I(n) and Q(n), based on these
polynomials, have a period 215 – 1 and are generated by using the following recursions:
I ( n ) = I ( n – 15 ) ⊕ I ( n – 10 ) ⊕ I ( n – 8 ) ⊕ I ( n – 7 ) ⊕ I ( n – 6 ) ⊕ I ( n – 2 ) (6.3)
Table 6-7 CDMA Reverse Traffic Channel Modulation Parameters for RS2
Parameter 14,400 bps 7200 bps 3600 bps 1800 bps units
PN chip rate 1.2288 1.2288 1.2288 1.2288 Mcps
Code rate 1/2 1/2 1/2 1/2 bits per code symbol
Transmitting duty 100 50 25 12.5 %
cycle
Code symbol 1 2 4 8 repeated code symbols
repetition per code symbol
Code symbol rate 28,800 28,800 28,800 28,800 sps
Modulation 6 6 6 6 repeated code symbol
per modulation symbol
Modulation symbol 4800 4800 4800 4800 sps
rate
Walsh chip rate 307.2 307.2 307.2 307.2 kcps
Mod. symbol duration 208.33 208.33 208.33 208.33 µs
PN chips per code 42.67 42.67 42.67 42.67 PN chips per repeated
symbol code symbol
PN chips per mod. 256 256 256 256 PN chips per mod.
symbol symbol
PN chips per 4 4 4 4 PN chips per Walsh chip
Walsh chip
TIA IS-95 CDMA System 99
Q ( n ) = Q ( n – 15 ) ⊕ Q ( n – 12 ) ⊕ Q ( n – 11 ) ⊕
Q ( n – 10 ) ⊕ Q ( n – 9 ) ⊕ Q ( n – 5 ) ⊕ (6.4)
Q(n – 4) ⊕ Q(n – 3)
based on gQ (x) as the characteristic polynomial, where I(n) and Q(n) are binary numbers (0 and
1) and the additions are modulo-2. To obtain the I and Q pilot PN sequences (of period 215), a 0
is inserted in I(n) and Q(n) after 14 consecutive 0 outputs (this occurs only once in each period).
Therefore, the pilot PN sequences have one run of 15 consecutive 0 outputs instead of 14.
The chip rate for the pilot PN sequence is 1.2288 Mcps and its period is 26.666 ms. There
are exactly 75 pilot PN repetitions every 2 seconds. The spreading modulation is Offset Quadra-
ture Phase-Shift Keying (OQPSK). The data spread by Q pilot PN sequence is delayed by half a
chip time (406.901 nanoseconds [ns]) with respect to the data spread by I pilot PN sequence (see
chapter 7). Fig. 6-3 and Table 6-8 describe the characteristics of OQPSK.
Table 6-8 CDMA Reverse Traffic Channel Modulation Parameters for RS2
I Q Phase
0 0 π/4
1 0 (3π)/4
1 1 –(3π)/4
0 1 –π/4
Q-Channel
(1,0) (0,0)
I-Channel
(1,1) (0,1)
Figure 6-3 Signal Constellation and Phase Transition of OQPSK Used on Reverse CDMA
Channel
100 Ch. 6 • IS-95 CDMA Air Interface
Each base station transmits a pilot signal of constant power on the same frequency. The
received power level of the received pilot signal enables the mobile station to estimate the path
loss between the base station and the mobile station. Knowing the path loss, the mobile station
adjusts its transmitted power such that the base station will receive the signal at the requisite
power level. The base station measures the mobile station’s received power and informs the
mobile station to make the necessary adjustment to its transmitter power. One command every
1.25 ms adjusts the transmitted power from the mobile station in ±0.5 dB steps. The base station
uses frame errors reported by the mobile station to increase or decrease the transmitted power.
CDMA access channel modulation parameters are listed in Table 6-9.
CDMA provides a soft handoff. As the mobile station moves to the edge of its single cell,
the adjacent base station assigns a modem to the call; meanwhile, the current base station contin-
ues to handle the call. The call is handled by both base stations on a make-before-break basis.
Handoff diversity occurs with both base stations handling the call until the mobile station moves
sufficiently close to one of the base stations for it to then exclusively handle the call. This hand-
off procedure is different from conventional break-before-make or hard-handoff procedures. The
soft-handoff procedure will be discussed in more detail in chapter 10.
6.3 Summary
A CDMA system operates with a low Eb /N0 ratio, exploits voice activity, and uses sectorization
of cells. Each sector has 64 CDMA channels. It is a synchronized system with three receivers to
provide path diversity at the mobile station and four receivers at the cell site.
References 101
This chapter provided a high-level description of the IS-95 CDMA air interface. The for-
ward link channels are pilot, sync, paging, and forward traffic (fundamental and supplementary)
channels. The reverse link channels include access and reverse traffic (fundamental and supple-
mentary) channels.
6.4 References
1. Garg, V. K., Smolik, K. F., and Wilkes, J. E., Applications of CDMA in Wireless Communi-
cations, Prentice Hall PTR, Upper Saddle River, NJ, 1997.
2. TIA/EIA IS-95, “Mobile Station–Base Station Compatibility Standard for Dual-Mode
Wideband Spread Spectrum Cellular Systems,” 1998.
This page intentionally left blank
C H A P T E R 7
7.1 Introduction
This chapter first covers how to introduce a CDMA carrier in an existing AMPS or TDMA sys-
tem, establishing the number of AMPS or TDMA channels that should be removed in order to
introduce the first and second CDMA carrier of 1.23 MHz without interfering with the remain-
ing AMPS or TDMA carriers. After this, we briefly describe modulation schemes, bit repetition,
block interleaving, and channel coding that are used in processing logical channels on the IS-95
CDMA forward and reverse links. Details about information processing, message types, and
message framing are then presented for the pilot, sync, paging, and traffic channels on the for-
ward link. This chapter also provides similar details for the access and traffic channels on the
reverse link.
103
104 Ch. 7 • Physical and Logical Channels of IS-95 CDMA
45 MHz
283
22 22 33 33
55 66 00 11
34 23 34 23
CDMA carrier bandwidth of 1.23 MHz. The recommended guard band between the CDMA
carrier band edge and an AMPS or a TDMA carrier is 0.27 MHz—that is equal to 9 AMPS or
TDMA channels. Thus to introduce the first CDMA carrier without interfering with the remain-
ing AMPS or TDMA channels, it is necessary that 59 AMPS channels be removed. In order to
introduce the second CDMA carrier, we should remove only 41 additional AMPS channels. We
see from Fig. 7-3 that, to introduce two CDMA carriers, we should remove 100 AMPS chan-
nels, a total of 3 MHz.
The primary and secondary CDMA carriers are the preassigned frequencies (AMPS chan-
nel numbers) that allow the mobile to acquire the CDMA system. A base station can support pri-
mary, secondary, or both types of channels.
The 1.23-MHz bandwidth for a CDMA carrier suggests that the minimum center fre-
quency separation between two carrier frequencies is 1.23 MHz. The MS and BS frequencies
22 22 22 33 33
11 22 66 00 11
23 12 23 34 23
for cellular band (Band Class 0) are specified in Table 7-1. The channel spacings, CDMA
channel designations, and transmit center frequencies of Band Class 0 are given in Table 7-2.
The valid CDMA carrier frequencies are on AMPS channel numbers 1013–1023, 1–311, 356–
644, 689–694, and 739–777 (see Table 7-3). Only the primary and secondary CDMA carrier
Table 7-2 CDMA Channel Number to CDMA Frequency Assignment for Band Class 0
Transmitter CDMA Channel Number CDMA Frequency Assignment (MHz)
Mobile station 1 ≤ N ≤ 777 0.030 N + 825.000
1013 ≤ N ≤ 1023 0.030 [N – 1023] + 825.000
Base station 1 ≤ N ≤ 777 0.030 N + 870.000
1013 ≤ N ≤ 1023 0.030 [N – 1023] + 870.000
center frequencies are specified in IS-95 standard. Other center frequencies are selected by
each system operator.
Table 7-4 shows the CDMA center frequency (AMPS channel number) assignments for
systems A and B with 41 AMPS channel separation.
The mobile station and base station frequencies for the PCS band (Band Class 1) are spec-
ified in Table 7-5. The channel spacings, CDMA channel designations, and transmit center fre-
quencies of Band Class 1 are given in Table 7-6. Mobile stations in Band Class 1 support
operations on channel numbers 25 through 1175 as shown in Table 7-7. Note that certain chan-
nel assignments are not valid and that others are conditionally valid. Transmission on condition-
ally valid channels is allowed if the adjacent block is allocated to the licensee or if other valid
authorization has been obtained.
A preferred set of CDMA frequency assignments for Band Class 1 is given in Table 7-8.
Table 7-4 CDMA Center Frequency Assignment for Systems A and B for Cellular Band Class 0
CDMA Frequency AMPS Channels
CDMA Channel Type System A System B
Primary 283 384
242 425
201 466
160 507
119 548
78 589
37 630
1019
Secondary 691 777
Total number of CDMA channels 9 8
Table 7-6 CDMA Channel Number to CDMA Frequency Assignment for Band Class 1
Transmitter CDMA Channel Number Center Frequency of CDMA Channel (MHz)
Mobile station 0 ≤ N ≤ 1199 1850.000 + 0.050 N
Base station 0 ≤ N ≤ 1199 1930.000 + 0.050 N
Table 7-8 CDMA Preferred Set of Frequency Assignments for Band Class 1
Block Preferred Set of Channel Numbers
A 25, 50, 75, 100, 125, 150, 175, 200, 225, 250, 275
D 325, 350, 375
B 425, 450, 475, 500, 525, 550, 575, 600, 625, 650, 675
E 725, 750, 775
F 825, 850, 875
C 925, 950, 975, 1000, 1025, 1050, 1075, 1100, 1125, 1150, 1175
Modulation 109
7.3 Modulation
The signals from each channel (pilot, sync, paging, and traffic) are modulo-2 added to I and Q
PN short-code sequences. The I and Q spread signals are baseband filtered and sent to a linear
adder with gain control (see Fig. 7-4). The gain control allows individual channels to have differ-
ent power levels assigned to them. The CDMA system assigns power levels to different channels
depending on the quality of the received signal at a mobile station. The algorithms for determin-
ing the power levels are proprietary to each equipment manufacturer. The I and Q baseband sig-
nals are modulated by I and Q carrier signals, combined together, amplified, and sent to the base
station antenna. The net signal from the CDMA modulator is a complex quadrature signal that
looks like noise.
The same PN short-code sequences are used on all channels (i.e., pilot, sync, paging, and
traffic) of the forward link. All base stations in a system are synchronized using the GPS satel-
lite. Different base stations use time-shifted versions of these PN sequences to allow mobile sta-
tions to select the appropriate base station.
Unlike the forward direction, the CDMA system uses a different modulation scheme to
generate the signal in the reverse direction. The net signal from modulator is a 4-phase quadra-
ture signal. The output from either the access channel or the traffic channel is sent to two mod-
ulo-2 adders—one for the in-phase channel and the other for the quadrature channel. Two
different short-code PN sequences are modulo-2 added to the data and filtered by a baseband fil-
ter. For a quadrature channel, a delay of 1/2 PN symbol (406.9 ns) is added before the filter.
Thus, the reverse channel uses OQPSK (see Fig. 7-5). No pilot signal is used on the reverse link.
I LPF
Q LPF
Q/2
sin (ωt + φ) cos (ωt + φ)
Transmitter LPF = Linear Pass Filter Receiver
I-Channel Sequence
1.2288 Mcps sin (ωt + φ)
I
Baseband
Filter
s(t )
1/2 PN Chip
Delay = 406.9 ns
Q Baseband
D
Filter
traffic channels is 14,400 bps. If the data is transmitted at the lower rates (7200, 3600, or 1800
bps), then the data bits are repeated either 2, 4, or 8 times to increase the rate to 14,400 bps.
Control Channels
Downlink Uplink
Traffic Channels
Dim &
Burst
1/4, and 1/8. The downlink traffic channel is called the forward link, whereas the uplink traffic
channel is referred to as the reverse link.
When user speech or data is replaced by associated signaling, it is called blank-and-burst
signaling. When part of the speech is replaced by signaling information, it is called dim-and-
burst signaling. All associated signaling is sent in Rate 1. In addition, on the downlink there is a
power control subchannel that allows the mobile to adjust its transmitted power by ±1 dB every
1.25 ms (i.e., 16 times during a 20-ms speech frame).
In the forward direction there are the pilot channel, the sync channel, up to seven paging
channels, and a number of forward traffic channels that all share the same center frequency. Out
of the 64 Walsh-coded channels available for use (W0, W1, W2, …, W63), the pilot channel on W0
is always required. There can be one sync channel (W32) and seven paging channels (W1 to W7—
the maximum allowed); the remaining channels are traffic channels. A traffic channel is further
subdivided into a fundamental code channel and a supplementary code channel (see Figs. 6-1
and 6-2). The primary paging channel is always assigned the Walsh code W1. The mobile exam-
ines the number of paging channel parameters in the system parameter message. If this value is
not 1, a hashing algorithm is invoked to determine the correct paging channel number.
I Pilot PN
Walsh W0 Sequence at 1.2288 Mcps
BB
1.2288
All 0s Mcps
To QPSK
Modulator
BB
BB = baseband filter
Q Pilot PN
Sequence at 1.2288 Mcps
pilot signals are quadrature pseudorandom (PN) binary sequence signals with a period of 32,768
(215) chips. Since the chip rate is 1.2288 Mcps, the pilot PN sequence corresponds to a period of
26.667 ms. This is equivalent to 75 pilot channel code repetitions every 2 seconds. The pilot sig-
nals from all base stations use the same PN sequences, but each base station is identified by a
unique time offset. These offsets are in increments of 64 chips to provide 512 unique offsets (see
Fig. 7-8). The high number of offsets ensures that unique base station identification can be
obtained even in dense microcellular environments.
PN Offsets
0 i–1 i k 511
64
chips 32,768 Chips
I Pilot PN
Walsh Code W32 1.2288 Mcps
BB
Sync Code Modulated
Channel Message Symbol Symbol
1.2288
Convolutional Mcps
Encoder
Symbol Block To QPSK
Rate = 1/2, K = 9 Repetition Interleaver Modulator
1.2 2.4 4.8 4.8
kbps ksps ksps ksps
BB
BB = baseband filter
ksps = kilosymbols per second
Q Pilot PN
1.2288 Mcps
Figure 7-9 Sync Channel Processing
114 Ch. 7 • Physical and Logical Channels of IS-95 CDMA
1 bit 31 bits
SOM Data
96 bits
80 ms
Figure 7-12 Sync Channel Superframe
frames. The padding bits are used so that the Start message always starts at 1 bit after the begin-
ning bit of the superframe.
I Pilot PN
Walsh Code 1–7 1.2288 Mcps
Paging Channel
BB
Message Code Modulation
(4.8 or 9.6 kbps) Symbol Symbol
Convolutional
Encoder
Symbol Block To QPSK
Rate = 1/2, K = 9 Repetition Interleaver Modulation
9.6 19.2 19.2
or ksps ksps
19.2 ksps
BB
19.2
64:1 ksps
frame is the start of a Paging Channel message (either synchronized or unsynchronized). Mes-
sages can also start in the middle of a frame and immediately after the end of an unsynchronized
message (with no padding bits). A value of 0 for SCI indicates that the frame is not the start of a
message and that it can include a message (with or without padding), padding only, or the end of
one message and start of another.
Eight paging channel half-frames are combined to form a paging channel slot (see Fig. 7-
15) of length 80 ms (384 bits at 4800 bps and 768 bits at 9600 bps). The entire Paging Channel
message is then sent in N slots. The maximum number of slots that a message can use is 2048.
The base station always starts a slot with an asynchronized message capsule that starts at 1 bit
after the beginning of a slot. The first bit in a slot is SCI = 1.
The paging channel carries information to allow the network to
Logical Channels 117
One Paging Channel Slot = 80 ms (384 bits at 4800 bps or 768 bits at 9600 bps)
8. Channel Assignment message. Message to inform the mobile station to tune to a new
frequency.
9. Data Burst message. Data message sent by base station to the mobile station.
10. Authentication Challenge message. Allows the base station to validate the mobile
identity. The unique mobile authentication keys and/or Shared Secret Data (SSD) for
each mobile registered in the system will be used to perform the authentication calcula-
tions. These are then sent back to the base station in an Authentication Challenge
Response message.
11. SSD Update message. Request by the base station for the mobile station to update the
SSD.
12. Feature Notification message. Contains information records to allow the network to
supply information to be displayed by the mobile, to identify the called party’s number,
to identify the calling party’s number, to convey information to the mobile by means of
tones or other alerting signals, and to indicate the number of messages waiting.
The paging channel is divided into 80-ms slots called the paging channel slots. IS-95
allows two modes of paging—slotted and nonslotted. In the slotted mode, a mobile listens for
pages only at certain times (i.e., during its page slot). This feature allows the mobile to turn off
its receiver for most of the time, saving the battery power and increasing time between battery
charging. In the nonslotted mode of operation, the mobile is required to monitor all paging slots.
In the slotted mode, a mobile generally monitors the paging channel for one or two slots
per slot cycle. The mobile can specify its preferred slot using the SLOT_CYCLE_INDEX field
in the Registration message, in the Origination message, in the Page Response message, in traf-
fic signaling to the base station. The length of the slot cycle, T, in units of 1.28 seconds is given
by T = 2i, where i is the selected slot cycle index.
There are 16T slots in a cycle for a particular mobile using some value of i, and four 20-ms
full frames in an 80-ms slot. A value of i = 0 means that the mobile listens to every 16th paging
slot; i = 1 implies that the mobile monitors every 32nd slot; for i = 2, the mobile monitors every
64th slot. The i = 0 value ensures that the pages are not missed by the mobile, but it is a drain on
mobile’s battery power. The value of i = 1 is suggested. PGSLOT is a randomly calculated num-
ber that specifies the slot out of the 16T slots to be monitored by the mobile. This number is
fixed for each mobile.
I-Channel PN
Sequence
1.2288 Mcps
1.2288 Mcps
Access BB
Message
Convolutional 64-ary
Encoder
Symbol Block
Orthogonal To OQPSK
Rate = 1/3, K = 9 14.4 Repetition Interleaver Modulation
4.8 28.8 28.8 Modulator
kbps ksps ksps ksps
BB
Q-Channel PN
Sequence
Long-Code
1.2288 Mcps
Generator 1.2288 Mcps
BB = baseband filter
Long-Code Mask
6 input symbols to the modulator, one output Walsh function is generated. The reason for using
orthogonal modulation of the symbol is the noncoherent nature of the reverse link. Since each
group of 6 symbols is represented by a unique Walsh function, it is much easier for the base sta-
tion to detect 6 symbols at a time by deciding which 64-bit Walsh function was transmitted dur-
ing that period. An exited of 6 coded symbols is used as 6 binary symbols corresponding to a
decimal value between 1 and 64. The pattern of the 6-symbol group determines the choice of the
particular Walsh function transmitted.
The Walsh function is defined by
where c5 is the most recent and c0 the oldest of the 6 symbols to be transmitted, and
Wi is selected from 1 of 64 orthogonal Walsh functions.
As an example suppose an exited of 6 symbols (–1, 1, 1, –1, –1, –1) is an input. The correspond-
ing bit values are (1 0 0 1 1 1). The output of the modulator in terms of the Walsh function will be
W 39 = 1 + 2 × 1 + 4 × 1 + 8 × 0 + 16 × 0 + 32 × 1 = 39
The 64-ary modulated data at 4.8 ksps (modulation symbols) or at 307.2 ksps (code sym-
bols) is spread using the long PN sequence at 1.2288 Mcps. The long code has a length of 242 – 1
bits and is generated by the following polynomial:
42 35 31 27 26 25 22 21 19 18
x +x +x +x +x +x +x +x +x +x +
L( x ) = (7.3)
17 16 10 7 6 5 3 2
x +x +x +x +x +x +x +x +x+1
The output of the long-code generator is modulo-2 added with a shared 42-bit long-code
mask to generate a long code. The long PN sequence is used to distinguish the access channel
from all other channels occupying the reverse link. The data is scrambled in the I and Q paths by
the short PN sequence. Since the reverse link uses OQPSK modulation, the data in the Q path is
delayed by 1/2 a PN chip. The primary reason for this delay is to prevent the collapse of the
QPSK signal envelope to 0. This is essential because the power amplifier of the mobile is typi-
cally small and limited in performance.
The message on the access channel consists of an access preamble of multiple frames of
96 0 bits with a length of 1_PAM_SZ frames (Fig. 7-17), followed by an Access Channel
message capsule of length 3 + MAX_CAP_SZ frames. The message capsule also consists of
frames 96 bits in length. Since the data rate on the access channel is 4800 bps, each frame has
a duration of 20 ms.
The entire access channel transmission, therefore, occurs in an access channel slot that has
a length of
where the values of MAX_CAP_SZ and PAM_SZ are received on the paging channel.
An access channel slot nominally begins at a frame where
88 bits 8 bits
Access Access
Access Channel Pramble Channel Channel
Frame Frame
The 19.2-ksps long code is decimated to 800 bps (see Fig. 7-21) to establish the location of the
bits in the power control subchannel. This is done to randomize the location of the power control
bits to avoid any spikes due to periodic repetition. Fig. 7-22 shows forward traffic channel pro-
cessing for RS2.
Each power control group contains 24 scrambled bits. The 24-bits position in a 1.25-ms
period is numbered 0, 1, 2, …, 23 (see Fig. 7-23). The power control bits are always trans-
mitted at full power.
Channels not used for paging or sync can be used for traffic. Thus, the total number of traf-
fic channels at a base station is 63 minus the number of paging plus sync channels in operation at
that base station. Information on the forward traffic channels includes the primary traffic
(voice or data), secondary traffic (data), and signaling in frames 20 ms in length.
When the data rate on the forward traffic channel is 9600 bps (RS1), each frame of 192
bits carries 172 information bits, 12 frame-quality bits, and 8 encoder tail bits (set of all 0s). At
4800 bps, there are 80 information bits, 8 frame-quality bits, and 8 tail bits for a total of 96 bits.
At 2400 and 1200 bps, there are 40 and 16 information bits and 8 tail bits, for a total of 48 and
24 bits, respectively. The base station can select the data transmission rate on a frame-by-frame
basis. A data rate of 9600 bps can support multiplexed traffic and signaling. Data rates of 1200,
2400, and 4800 bps can support only primary traffic information.
The frame-quality indicator is a CRC on the information bits in the frame. At 9600 bps the
generator polynomial is
I-Channel PN
Convolutional Sequence
Symbol
Encoder Walsh i (1.2288 Mcps)
Rate = 1/2, K = 9 Repetition
19.2 BB
ksps 800
64:1 24:1 bps
I-Channel PN
Long-Code Sequence
Decimator Decimator (1.2288 Mcps)
Generator
1.2288
Mcps
* Power control bits are not multiplexed in for supplemental code channel of the forward traffic channels.
BB = baseband filter
MUX = multiplexer
I-Channel PN
Convolutional Sequence
Symbol
Encoder 28.8 Walsh i (1.2288 Mcps)
Rate = 1/2, K = 9 Repetition
ksps
Power Control Bits BB
800 bps
Modulation
Symbol
Puncture 2 of Block To QPSK
Every 6 Inputs Interleaver MUX*
Modulation
19.2 19.2
ksps ksps
19.2 BB
ksps 800
64:1 24:1 bps
I-Channel PN
Long-Code Sequence
Decimator Decimator (1.2288 Mcps)
Generator
1.2288
Mcps
* Power control bits are not multiplexed in for supplemental code channel of the forward traffic channels.
BB = baseband filter
MUX = multiplexer
1.25
ms
20 21 22 23 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 0 1 2 3
These 4 bits of previous long code specified the starting point of the power
control bits value: 1 1 0 1 = 11; the power control bit starts at position 11.
12 11 10 9 8 4
g( x ) = x + x + x + x + x + x + x + 1 (7.6)
At 4800 bps, the generator polynomial is
8 7 4 3
g( x ) = x + x + x + x + x + 1 (7.7)
The generator polynomials for the 10-bit and 6-bit frame-quality indicators are as follows:
• 10-bit frame-quality indicator
8 7 4 3
g( x ) = x + x + x + x + x + 1 (7.8)
• 6-bit frame-quality indicator
6 2
g( x ) = x + x + x + 1 (7.9)
When the data rate on the forward traffic channel is 14,400 bps (RS2), each frame of 288
bits carries 267 information bits, 12 frame-quality bits, and 8 encoder tail bits. Table 7-9 pro-
vides a summary of the forward traffic channel frame structure for RS1 and RS2. Figs. 7-24 and
7.25 show the forward traffic channel frame structure for RS1 and RS2, respectively.
At 9600 bps, the 172 information bits consist of 1 or 4 format bits and 171 or 168 traffic
bits. A variety of different multiplexing options are supported. The entire 171 information bits can
be used for primary traffic, or the 168 bits can be used for 80 primary traffic bits and 88 signaling
traffic bits or 88 secondary traffic bits. Other options use 40 and 128 or 16 and 152 bits for pri-
mary and signaling/secondary traffic. Alternatively, the entire 168 bits can be used for signaling
or secondary traffic.
9600-bps
Frame 172 12 8
F T
4800-bps
Frame 80 8 8
F T
2400-bps
Frame 40 8
14,400-bps
Frame 1 267 12 8
R/F F T
7200-bps
Frame 1 125 10 8
R/F F T
3600-bps
Frame 1 55 8 8
R/F F T
When the forward traffic channel is used for signaling, the message is similar in form to
the paging channel (see Fig. 7-10) and has an 8-bit message-length header, a message body of a
minimum of 16 bits and a maximum of 1160 bits, and a CRC code of 16 bits. Following the
message are padding bits to make the message end on a frame boundary. The message length
includes the header, body, and CRC, but not the padding. The CRC is computed on the message-
length header and the message body using
16 12 5
g( x ) = x + x + x + 1 (7.10)
When the forward traffic channel is used for signaling, the following are typical messages
that can be sent:
1. Order message. Similar to the Order message on the paging channel.
2. Authentication Challenge message. When the base station suspects the validity of the
mobile, it can challenge the mobile to prove its identity.
3. Alert with Information message. Allows the base station to validate the mobile identity.
4. Data Burst message. A data message sent by the base station to the mobile.
5. Handoff Direction message. Provides the mobile with information needed to begin the
handoff process.
6. Analog Handoff Direction message. Tells the mobile to switch to the analog mode
and begin the handoff process.
7. In-Traffic System Parameters message. Updates some of the parameters set by the
System Parameters message in the paging channel.
8. Neighbor List Update message. Updates the neighbor base station parameters set by
the Neighbor List message on the paging channel.
9. Power Control message. Tells the mobile how long the period is or what threshold is
to be used in measuring frame-error statistics that will be sent in the mobile’s power
measurement report message.
10. Send Burst Dual-Tone Multifrequency (DTMF) message. When the base station
needs dialed digits, it can request them in this message. For example, this message
would be used for digits for a three-way call.
11. Retrieve Parameters message. Requests the mobile to report on any of the retrievable
and settleable parameters (refer to IS-95 appendix E).
12. Set Parameter message. Informs the mobile to adjust any of the retrievable and settle-
able parameters (refer to IS-95 appendix E).
13. SSD Update message. A request from the base station for the mobile to update the
shared secret data.
14. Flash with Information message. Contains information records to allow the network
to supply display information to be displayed by the mobile, to identify the responding
party’s number (the connected number), to convey information to the mobile by means
of tones or other alerting signals, and to indicate the number of messages waiting.
128 Ch. 7 • Physical and Logical Channels of IS-95 CDMA
15. Mobile Registration message. Informs the mobile that it is registered and supplies the
necessary system parameters.
16. Extended Handoff Direction message. One of several handoff messages sent by the
base station.
64-ary Data
Block
Othogonal Burst
To QPSK
Interleaver Modulation
28.8 Modulator 4.8 Randomizer
ksps ksps
BB
Q-Channel PN
Long-Code Sequence
Note: Numbers in ( ) represent RS2. Generator 1.2288 (1.2288 Mcps)
BB = baseband filter Mcps
Figure 7-26 Reverse Traffic Channel Processing for Fundamental Code Channel
Logical Channels 129
I-Channel PN
Sequence
(1.2288 Mcps)
BB
Convolutional 64-ary
Encoder
Block To QPSK
Orthogonal
Rate = 1/3, K = 9 Interleaver Modulation
9.6 28.8 Modulator 4.8
kbps ksps ksps
BB
Q-Channel PN
Long-Code Sequence
Generator 1.2288 (1.2288 Mcps)
BB = baseband filter Mcps
Figure 7-27 Reverse CDMA Channel Structure for Supplementary Code Channel
rate. For a vocoder operating at 9.6 kbps, no data is masked out, whereas, if the vocoder is oper-
ating at 1.2 kbps, then the symbols are repeated seven times and the data burst randomizer masks
out seven out of eight groups of symbols.
Each 20-ms traffic channel frame is divided into 16 power control groups of 1.25 ms each
(as discussed earlier). The data burst randomizer pseudorandomly masks out individual power
control groups (PCG). With 9.6 kbps, no PCG is masked out; with 4.8 kbps, 8 PCGs are masked
out in a frame; with 2.4 kbps, 12 PCGs are masked; with 1.2 kbps, 14 PCGs are masked. An
example of this operation with a vocoder operating at 2.4 kbps is shown in Fig. 7-28.
20 ms (16 PCGs)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
1.25
ms Data Burst
(1 PCG) Randomizer (operating at 2.4-kbps frame)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Transmitted PCG
The reverse channel structure for RS2 is similar. The RS2 vocoder supports 14.4, 7.2, 3.6,
and 1.8 kbps data rates. For RS2, the convolutional encoder is 1/2 instead of 1/3 as in RS1.
The system can multiplex primary (voice) and secondary (data) or signaling traffic on the
same traffic channel. Multiplex option 1 is used to transmit primary and secondary traffic. This
option is also used to transmit primary (voice) and signaling (messaging) traffic. Multiplex
option 1 uses the following methods to simultaneously transmit primary and secondary traffic.
• Blank and burst. The entire traffic channel frame is used to send only secondary data
or only signaling data. The secondary or signaling data blank out the primary data (see
Fig. 7-29).
• Dim and burst. The traffic frame is used to send both primary and secondary data or
both primary and signaling data (see Fig. 7-30). Fig. 7-31 shows the traffic channel
frame structure for the reverse link.
172 bits
Rate 1/2
MM TT TM
= 1 = 0 = 01
Rate 1/8
Primary
1 1 2 Traffic Signaling Traffic (152)
(16)
MM TT TM MM = mixed mode = 0; full speech
= 1 = 0 = 10 MM = 1; signaling only or lower-rate speech + signaling
TT = traffic type
TM = traffic mode
Traffic Rate—
1 171 bits F = 12 T = 8 9600 bps
Traffic Rate—
80 bits F = 8 T = 8 4800 bps
Traffic Rate—
40 bits T = 8 2400 bps
Traffic Rate—
16 bits T = 8 1200 bps
7. Send Burst DTMF message uses two tones DTMF—one low- and one high-frequency
tone to represent a dialed digit—and transmits dialed digits to the base station.
8. Status message contains information records from the mobile about mobile identifica-
tion, mobile call mode, mobile terminal information, and security status.
9. Origination Continuation message is a continuation of the origination message that
was sent on the access channel if additional dialed digits need to be sent.
10. Handoff Completion message is the mobile response to a Handoff Direction message.
11. Parameter Response message is the mobile response to the base station for a Retrieve
Parameters message.
7.8 Summary
This chapter discussed the implementation of CDMA carriers in an existing AMPS or TDMA
system, establishing that 59 AMPS carrier channels must be removed to introduce the first
CDMA carrier without interfering with the remaining AMPS or TDMA channels. The chapter
provided details of information processing and message framing for the pilot, sync, paging, and
traffic channels on the forward link. The pilot channel (Walsh code 0) is unmodulated; it consists
of only short-code-spreading sequences.
The pilot channel is used by all mobiles attached to a cell as a coherent phase reference
and also provides a unique identifier for different base stations. The sync channel (Walsh code
32) transmits system timing information to allow mobiles to synchronize themselves with base
stations. The paging channel(s) (Walsh codes 1–7) are the digital control channel(s) for the
CDMA forward link. One base station can have up to 7 paging channels. The first paging chan-
nel is always assigned Walsh code 1. The traffic channels (Walsh 8–31 and 33–63) carry digi-
tized voice data.
On the reverse link, the access channel is used by the mobile to register with the system, to
access the system before assignment of a traffic channel, to originate a call, or to respond to a
page. Several access channels can be used per paging channel. The reverse traffic channels are
used to deliver encoded voice and reverse link signaling from mobile to base station.
We also presented typical messages that are carried over the logical channels of the for-
ward and reverse links.
7.9 References
1. Garg, V. K., Smolik, K., and Wilkes, J. E., Applications of CDMA to Wireless/Personal
Communications, Prentice Hall PTR, Upper Saddle River, NJ, 1997.
2. Garg, V. K., and Wilkes, J. E., Wireless and Personal Communications Systems, Prentice
Hall PTR, Upper Saddle River, NJ, 1996.
3. Rappaport, T. S., Wireless Communications, Prentice Hall PTR, Upper Saddle River, NJ,
1996.
4. TIA/EIA/SP-3693, “Mobile Station–Base Station Compatibility Standard for Dual-Mode
Wideband Spread Spectrum Cellular Systems,” November 1997.
C H A P T E R 8
8.1 Introduction
This chapter discusses IS-95 CDMA call processing states that a mobile station goes through in
getting to a traffic channel. These include the system initialization state, the system idle state, the
system access state, and the traffic channel state. Each of the call processing states has several
substates that are also discussed, in addition to idle handoff, slotted paging operation, CDMA
registration, and authentication procedures. The chapter covers messages used to exchange data
in different call processing states and concludes by providing call flows for CDMA call origina-
tion, call termination, call release, and authentication.
133
134 Ch. 8 • IS-95 CDMA Call Processing
• Blank-and-burst signaling. The case where the complete speech packet is replaced
with signaling.
• Dim-and-burst signaling. The case where part of the speech packet is replaced with
signaling.
CDMA RF Carrier
Selection
Tune to primary/secondary
CDMA carrier.
In addition, power control messages are sent by a method called bit puncturing on the for-
ward link channel. In bit puncturing two gross-data bits are replaced by a single power control
bit.
Power-up and
Mobile Enters Analog
Initialization Initialization
State Enter
Idle State
Begin Analog End Analog Mode—
Mode No CDMA Pilot
Found
CDMA system. Upon entering the sync channel acquisition substate, the mobile sets
its code channel for the sync channel. If the mobile does not receive a valid sync
channel message within T21m seconds, the mobile enters the system determination
substate with a protocol mismatch indication. If the mobile receives a valid sync
channel message within T21m seconds, the mobile stores system configuration and tim-
ing information.
• Timing change substate. The mobile synchronizes its long-code timing and system
timing to those of the CDMA system after receiving and processing the synchroniza-
tion message.
Fig. 8-3 shows the system states and the activities associated with them.
Synchronization occurs when the phase (t – T) of the locally generated PN code is equal to
the phase (t – Ti – Tp) of the incoming code.
(t – T ) = (t – Ti – T p) (8.1)
∴T = T i + T p (8.2)
1
Analog CDMA
Initialization Initialization
Idle
End Analog 2 Handoff
Mode
Idle
State
Call Origination, System
Page Response, 3 Access Ack
or Registration Other Than
System
Origination
Access or Page
State Response
Traffic Channel
Acquisition
4
Control on End of Traffic
Traffic Channel Channel Use
Figure 8-3 CDMA Call Processing States for Dual Mode Mobile
CDMA Call Processing State 137
1. When the locally generated code phase matches with the incoming pilot, pilot acquisi-
tion occurs. Thus, PN (t – Ti – Tp) is known.
2. Although total phase (Ti + Tp) is known, the pilot offset Ti is not known. We get the pilot
offset Ti from the Sync message of the sync channel.
Once the sync channel is acquired and the Sync message is received and processed, the
mobile stores the following information from the Sync message:
• Protocol revision level (MIN_P_REVstored = MIN_P_REVreceived)
• System identification (SID)
• Network identification (NID)
• Pilot PN offset (Ti )
• System time (Ts )
• Long-code state at system time (LC_STATE)
• Paging channel data rate (PRAT)
• Number of leap seconds that have occurred since the start of system time (LP_SEC)
• Offset of local time from system time (LTM_OFF)
• Daylight saving time indicator (DAY_LT)
In the timing change substate, the mobile uses the pilot offset, the system time, and the
long-code state information, obtained from the Sync message, to synchronize its timing to the
system time and to synchronize its long-code phase to that of the system.
In IS-95 the long code is generated with a 42-stage shift register. The mobile knows the
generation polynomial. The problem is to get the correct code phase. The mobile obtains the
long-code state from the Sync message. The long code is a 42-bit sequence that corresponds to
the contents of a shift register at the system time, Ts. The mobile loads its shift registers with the
42-bit long-code state. The mobile waits and, at system time Ts, it starts shifting the contents of
the shift registers at 1.2288 Mcps. At this point, long-code synchronization is achieved. The
mobile may now tune to a paging channel in order to enter the idle state.
CDMA Initialization
Acquire
Primary Paging
Channel (W1)
Idle Activities
- Monitor Paging Channel
- Authentication
- Idle Handoff
- Update Overhead Information
- Page Response
- Mobile Origination
- Registration
The paging channel is subdivided into 80-ms slots called paging channel slots. In the non-
slotted mode, paging and control data for the mobile can be received in any of the paging chan-
nel slots. Therefore, the mobile monitors all slots on a continuous basis. In IS-95, the paging
channel protocol also allows scheduling the transmission of messages for a given mobile in cer-
tain assigned slots. A mobile station that monitors the paging channel only during certain
assigned slots is referred to as operating in the slotted mode. During the slots in which the pag-
ing channel is not monitored, the mobile can stop or reduce its processing activities to save bat-
tery power. This is sometimes referred to as a discontinuous reception mode of operation.
In the slotted mode operation, the mobile monitors the paging channel for 1 or 2 slots per
cycle. Slotted page messages contain a field called more-pages. When this field is set to 0, it
indicates that the remainder of the slots will contain no more messages addressed to the mobile.
This allows the mobile to stop monitoring the paging channel as soon as possible. If a Slotted
Page message with the more-pages field set to 0 is not received in the assigned slot, the mobile
continues to monitor the paging channel for one additional slot. For each of its assigned slots,
the mobile begins monitoring the paging channel in time to receive the first bit of the assigned
slot. The mobile then continues to monitor the paging channel until one of the following condi-
tions is satisfied:
1. The mobile receives a Slotted Page message with the more-pages field set to 0.
2. The mobile monitors the assigned slot and the slot following the assigned slot and
receives at least one valid message.
The mobile can specify its preferred slot cycle using the SLOT_CYCLE_INDEX field in
CDMA Call Processing State 139
the Registration message, Origination message, or Page Response message. When the mobile
station is in the control on traffic channel state, it can also specify the preferred slot cycle using
the SLOT_CYCLE_INDEX field of the terminal information record of the Status message. The
length of the slot cycle, T, in units of 1.28 seconds, is given as
i
T = 2 (8.3)
where i = selected slot cycle index.
There are 16 × T slots in a slot cycle for a particular mobile using some value of i, and four
20-ms full frames in 80-ms slot. SLOT_NUM is the paging slot number. To determine the
assigned slots, the mobile uses a Hash algorithm to select a slot number in the range 0 to 2048.
The minimum and maximum cycles are 16 slots (1.28 seconds) and 2048 slots (163.84 seconds),
respectively. The value of SLOT_NUM is given as
2047 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
80 ms
0
i = 0, T = 2 = 1; PGSLOT = slot number 6 out of every 16 slots
state. The mobile determines that a handoff should occur when it detects a new pilot that is suffi-
ciently stronger than the current pilot.
Pilot channels are identified by short PN offsets. They are grouped into sets describing
their status with respect to pilot searching procedures. In the idle state, three pilot sets are main-
tained: active, neighbor, and remaining.
Using a strategy similar to a sliding correlator, it is possible to acquire a pilot if its short
PN code’s correct phase is known. For each pilot set, a search window is specified. This allows
the mobile to search for the direct path as well as multipath components of the pilot signal. The
search window is centered either on the earliest arriving multipath or the short PN offset.
If the mobile determines that a neighbor set or remaining set pilot is sufficiently stronger
than the active set pilot, idle handoff is performed. While performing an idle handoff, the mobile
operates in nonslotted mode until at least one valid message is received from the new paging
channel. On receiving a valid message from the new paging channel, the mobile may resume
slotted mode operation. After performing an idle handoff, the mobile discards all unprocessed
messages received on the old paging channel.
The paging channel is used to transmit control information to the mobiles that have not
been assigned to traffic channels.Two types of control messages are sent:
• Overhead messages that are broadcast messages for all mobile stations.
• Directed messages addressed to a particular mobile or a specific group of mobiles.
There are four overhead messages that are continuously broadcast on the paging channel.
1. System Parameter message
2. Neighbor List message
3. CDMA Channel List message
4. Access Parameters message
The first three messages are called configuration messages. A configuration message sequence
number (CONFIG_MSG_SEQ) is associated with a set of configuration messages sent on the
paging channel. When the contents of one or more configuration messages change, the configu-
ration message sequence number is incremented. The mobile stores the sequence number con-
tained in each configuration message received.
Access Parameters messages are sequenced by the access parameter sequence number
(ACC_MSG_SEQ). The mobile stores the most recently received Access Parameters message
sequence number in the ACC_MSG_SEQ field.
Configuration and access parameters from one paging channel are not used while
monitoring a different paging channel. If the stored parameters are current, the mobile
processes the messages on the paging channel. When a System Parameter message
(SYS_PAR_MSG_SEQr) is received, its associated configuration message sequence number
(CONFIG_MSG_SEQr) is compared to the stored value of the System Parameter message
(SYS_PAR_MSG_SEQs). As long as there is a match, the received System Parameter message
142 Ch. 8 • IS-95 CDMA Call Processing
is ignored. If the result is a mismatch, the mobile stores the configuration message sequence
number, the SID, NID, and the base station identification (BASE_ID).
When an Access Parameters message is received, the ACC_MSG_SEQr is compared to
the stored value of the Access Parameters message sequence value (ACC_MSG_SEQs). If there
is a match, the received Access Parameters message is ignored. However, if the result is a mis-
match, the mobile stores the following parameters:
• Access Parameters message sequence number (ACC_MSG_SEQ)
• Number of access channel (ACC_CHAN)
• Nominal transmit power (NOM_PWR)
• Initial power offset for access (INIT_PWR)
• Power increment or power step (PWR_STEP)
Update
Overhead Information Received General Page
Substate Message, Page Message,
or Slotted Page Message
Registration
Access Page
User Initiated a Response
Received Message or Order
User Cancelled Call, or PACA Call Substate
Requiring Acknowledgment
a PACA Call Reoriginated
or Response
User-Generated
Mobile Data Burst Message
Order/Message
Response Mobile
Substate Origination
Registration Attempt
Access Substate
Substate
Mobile
Message PACA
Transmission Cancel
Substate Substate
• Page response substate. The mobile sends a Page Response message to the base station.
• Registration access substate. The mobile station sends a Registration message to the
base station.
• Mobile station order/message response substate. The mobile sends a response to a
message received from the base station.
• Mobile station message transmission substate. The mobile sends a Data Burst mes-
sage to the base station.
• PACA cancel substate. The mobile sends a Priority Access Channel Assignment
(PACA) Cancel message. If the base station responds with an authentication request,
the mobile responds in this substate.
Origination
Attempt
Traffic Channel
Initialization
Mobile receives a
base station ACK order.
Conversation
Release
To Initialization State
Figure 8-9 Mobile Control on Traffic Channel (Call Origination)
• Traffic channel initialization substate. In this substate, the mobile verifies that it can
receive the forward traffic channel and begins to transmit on the reverse traffic channel.
• Conversation substate. The mobile station exchanges primary traffic packets with the
base station.
• Release substate. The mobile station disconnects the call.
Call Termination: The mobile station control on traffic channel for call termination con-
sists of the following substates (see Figs. 8-11 and 8-12):
Origination
A
(Access Channel) Origination
Subscriber Validation
Origination ACK
Null Data B
Channel Assignment
(Paging Channel)
Traffic Channel Preamble Frame Selector (FS) Request
FS Assignment C
FS Assignment
ACK
Channel Confirm
Origination Continuation
(Optional)
Origination Continuation
(Optional)
Setup
TO PSTN
ACK
Service Option Response
Service Option Response
Answer
Page Response
Traffic
Channel
Initialization
Mobile terminates call and receives
a base station ACK order on
forward traffic channel.
Waiting for
Order
Mobile receives an alert
with information message.
Mobile receives
Waiting for
release order.
Mobile
Mobile Answer
receives
release Mobile user answers call.
order.
Conversation
Release
which slots the mobile is monitoring. The mobile supplies the station class mark and protocol
revision number so that the base station knows the capabilities of the mobile station.
IS-95 supports nine different forms of registration:
1. Power-up registration. The mobile registers when it powers up, switches from using
an alternative serving system, or switches from using the analog system with dual-
mode cellular mobile.
CDMA Registration 147
Tone Request
Page Request Tone
Page
(Broadcast Channel)
(Paging Channel) Tone ACK
Page Response
(Access Channel)
ACK Page Response
(Paging Channel)
(Pref. Mode CDMA)
Call Treatment
Channel Assignment
(Paging Channel)
Traffic Preamble
FS (Frame Selector)Request
ACK
FS Assignment
FS Assignment
Transport Setup
ACK
ACK
Service Option Response
Alert
Connect Order
Answer
Answer
PSTN
Answer
ACK
2. Power-down registration. The mobile registers when it powers down, informing the
system that it is no longer active.
3. Timer-based registration. The mobile registers at regular intervals. Its use also allows
the system to automatically deregister mobile stations that did not perform a successful
power-down registration.
4. Distance-based registration. A mobile station registers when the distance between the
current base station and the base station in which it last registered exceeds a threshold.
The mobile determines that it has moved a certain distance by computing a distance
based on the difference in latitude and longitude between the current base station and
the base station where the mobile last registered. If this distance exceeds the threshold
value, the mobile station registers.
5. Zone-based registration. A mobile registers when it enters a new zone. Zones are
groups of base stations within a given system and network. A base station’s zone
148 Ch. 8 • IS-95 CDMA Call Processing
ACK
ACK
Clear
Disconnect
ACK
Figure 8-13 Flow Diagram for CDMA Call Release (Far-End Initiated)
Release
ACK
FS (Frame Selector) Remove
ACK
Release
ACK
Clear
Disconnect
ACK
Disconnect
Figure 8-14 Flow Diagram for CDMA Call Release (Mobile Initiated)
8.4 Authentication
To authenticate a mobile station, secret data known as the A-key is used. The A-key is known
only to the Authentication Center (AC) of the mobile’s home system and to the mobile station. It
is the most secure piece of secret data. The A-key and a special random number (RANDSSD)
can be used by the AC and mobile to generate Shared Secret Data (SSD). The AC may send SSD
to the serving system, but it never sends it over the air link.
RAND is a 32-bit random number issued periodically by the base station in the system
overhead data in two 16-bit segments: RAND_A and RAND_B. The mobile stores and uses the
most recent version of RAND in the authentication process. The last RAND received by the
mobile station is confirmed from the mobile with an 8-bit number RANDC, a part of RAND,
since the current system RAND and the one used by the mobile station could differ when the
base station receives mobile station results.
The Electronic Serial Number (ESN) is a 32-bit binary number that uniquely identifies the
mobile to any system. It is factory set and not readily alterable in the field. Modification of the
ESN requires a special facility not normally available to subscribers.
The Mobile Identification Number (MIN) is derived from mobile station’s 10-digit direc-
tory telephone number. The first 3 digits map into the 10 most significant bits, the second 3 dig-
its map into the next 10 bits, while the last 4 digits map into the remaining 14 bits.
The SSD is a 128-bit pattern stored in the semipermanent memory of the mobile and is
known by the base station. SSD is a concatenation of two 64-bit subsets: SSD_A and SSD_B.
SSD_A is used to support the authentication procedure, and SSD_B is used to support voice pri-
vacy and message confidentiality.
SSD is maintained during power off. It is generated using a 56-bit random number
(RANDSSD created by the home AC), the mobile’s A-key, and the ESN. The A-key is a 64-bit
secret pattern assigned and stored in mobile station’s permanent security and identification
memory. The need to pass the A-key itself from system to system as the subscriber roams is
eliminated. SSD updates are carried out only in the mobile station and its associated home sys-
tem’s HLR/AC, not in the serving system. The AC manages the encrypting keys associated with
an individual subscriber when such functions are provided within the network.
150 Ch. 8 • IS-95 CDMA Call Processing
All mobiles are assigned an ESN when they are manufactured. They are also assigned a
15-digit International Mobile Subscriber Identity (IMSI). When the mobile is turned on, it must
register with the system. When it registers, it sends its IMSI and other data to the network. The
VLR in the visited system then queries the home system’s HLR for the security data and service
profile information. The VLR then assigns a Temporary Mobile Subscriber Identity (TMSI) to
the mobile station. The mobile station uses the TMSI for further accesses to that system. The
TMSI provides anonymity of communications since only the mobile and the network know the
identity of the mobile with a given TMSI. When a mobile roams into the new system, some air
interfaces use TMSI to query the old VLR and then assign a new TMSI; other air interfaces
request that the mobile station send its IMSI, and then they assign a new TMSI.
The network transmits a random number RAND that is received by all mobile stations.
When a mobile station accesses that system, it calculates AUTHR, an encrypted version of
RAND using SSD_A. It then transmits to the network the desired message with its authentication.
For additional details on authentication refer to chapter 11.
The network performs the same calculation and confirms the identity of the mobile. All
communications between the mobile and network are encrypted to prevent someone’s decoding
of the data and using the data to clone other mobile stations. Furthermore, each time a mobile
places or receives a call, a call history count is incremented (CHCNT). The counter is also used
for clone detection since clones will not have a call history identical to the legitimate mobile.
Procedures have been designed to allow a system to challenge an individual mobile with a
unique challenge and to update the SSD.
Service Request
Validate
RAND
AUTH Request
AUTH Request
Calculate
AUTHR
AUTH Response
Call
Proceeds
AUTH Response (+)
Regist. Accept
Challenge Response
Challenge Response
AUTH Request
Calculate
AUTHC
AUTH Response
Compare
Call Proceeds or
Terminates
All mobile stations accessing the network must respond to the global challenge as part of
their access. The global challenge response is an integral part of the network access (call origi-
nation, page response, registration, and so on). The call flow for global challenge is given in
Fig. 8-15.
The unique challenge can be sent to a mobile station at any time. It is typically initiated by
the MSC in response to the some event (registration failure and after a successful handoff are the
most typical cases). This is used to challenge the mobile as to its identity. Fig. 8-16 shows call
flows for the unique challenge.
8.5 Summary
This chapter discussed the CDMA call processing states and provided details of different mes-
sages that are used to exchange information in these states. We presented the registration and
authentication procedures of CDMA and concluded the chapter by discussing mobile substates
and flow diagrams for CDMA call origination, call termination, and call release.
8.6 References
1. Garg, V. K., Smolik, K. F., and Wilkes, J. E., Applications of CDMA in Wireless Com-
munications, Prentice Hall PTR, Upper Saddle River, NJ, 1997.
2. Garg, V. K., and Wilkes, J. E., Wireless and Personal Communications Systems, Pren-
tice Hall PTR, Upper Saddle River, NJ, 1996.
3. TIA IS-95 B, “Mobile Station and Radio Interface Specifications.”
This page intentionally left blank
C H A P T E R 9
Signaling Applications in
IS-95 CDMA
9.1 Introduction
In chapter 5, we discussed the CDMA system architecture used for cellular and PCS in North
America as embodied in the design standardized by TIA and ATIS in IS-95A for the cellular sys-
tem and J-STD-008 for PCS. Chapter 8 covered IS-95 CDMA call processing states that a
mobile station goes through in getting to a traffic channel. These states include the system ini-
tialization state, system idle state, system access state, and traffic channel state. It also covered
CDMA registration and authentication procedures and included the messages that are used to
exchange information in different call processing states. We then provided call flows for CDMA
call origination, call termination, call release, and authentication.
In this chapter, we first describe the layering concept that has been used to develop the
protocols for IS-95 CDMA and then focus on three functional entities—Mobile Station (MS),
Base Station System (BS), and Mobile Switching Center (MSC)—discussing the standardized
interfaces between these entities. The focus is mainly on the A-interface and TIA IS-634-defined
MSC-BS messages, message sequencing, and mandatory timers at the BS and the MSC. The
chapter concludes with call flow diagrams for typical supplementary services, handoff scenarios,
and Over-the-Air Service Provisioning (OTASP).
153
154 Ch. 9 • Signaling Applications in IS-95 CDMA
The link layer provides protocol support and control mechanisms for data transport ser-
vices and maps the data transport needs of the upper layers into the specific capabilities and
characteristics of the physical layer. It maps logical and signaling channels into code channels
specifically supported by the coding and modulation functions of the physical layer.
The link layer (layer 2) is subdivided into the Link Access Control (LAC) and Medium
Access Control (MAC) sublayers (see Fig. 9-2). Applications and upper-layer protocols corre-
sponding to OSI layers 3 through 7 utilize the services provided by LAC. The LAC sublayer per-
forms the functions essential to set up, maintain, and release a logical link connection.
The MAC sublayer provides a control function that manages resources supplied by the
physical layer (e.g., physical code channels for communication of information over the air inter-
face) and coordinates the usage of those resources desired by various LAC service entities. This
coordination function (which operates under direct control of the BS MAC function) resolves
contention issues between LAC service entities within a single mobile station, as well as
between competing mobile stations. The MAC sublayer is also responsible for delivering the
Quality of Service (QoS) level requested by a LAC service (e.g., by reserving air interface
resources or by resolving priorities between competing LAC service entities).
In IS-95 CDMA the MAC uses Radio Link Protocol (RLP), which provides a highly effi-
cient streaming service that makes a best effort to deliver data between peer entities. The RLP
provides both a transparent and nontransparent mode of operation. In the nontransparent mode
RLP uses Automatic Repeat Request (ARQ) protocols to retransmit data segments that were not
delivered properly by the physical layer. In this mode RLP introduces some delay. In the trans-
parent mode, RLP does maintain byte synchronization between the sender and receiver and noti-
fies the receiver of the missing parts of the data stream. Transparent RLP does not introduce any
transmission delay and is useful in implementing voice services over RLP.
Upper-layer entities provide support for multiple concurrent active sessions with any com-
bination of service type, such as
• Voice service including voice telephony, PSTN access, mobile-to-mobile voice ser-
vices, and Internet telephony
Layered Structure 155
• End-user data-bearing services including packet data, circuit data services, and short
message service (SMS)
• Signaling services that control all aspects of operation of the mobile station
Packet data services conform to industry standard connection-oriented and connectionless
packet data including IP-based protocol (e.g., Transmission Control Protocol [TCP] and User
Data Protocol [UDP]) and ISO/OSI Connectionless Interworking Protocol (CLIP).
Circuit data services emulate international-standard-defined connection-oriented services
such as asynchronous dial-up access, fax, etc.
Fig. 9-2 shows IS-95 (2G CDMA system) and cdma2000 (3G CDMA) layered structure
with protocols.
Upper Signaling
Layers Services TCP UDP
(OSI 3–7) High-Speed
Circuit Network
Layer Services
IP
PPP
Link
Layer MAC
(OSI 2) Control Best Effort Delivery RLP
State
MAC
Physical
Layer Physical Layer
(OSI 1)
Figure 9-2 TIA IS-95 and cdma2000 Layered Structure with Protocols
156 Ch. 9 • Signaling Applications in IS-95 CDMA
9.3 A-Interface
North American standards, until recently, have not addressed the standardization of the BS-MSC
interface (the A-Interface in the network reference model). However, wireless service providers
are experiencing explosive growth in North America and are consequently finding it necessary to
purchase equipment from multiple equipment manufacturers. Thus, the wireless industry has
pressed for standards specifying the A-Interface. At this time, however, the BTS-BSC interface,
i.e., the Abis interface, is not being addressed. TIA IS-634 defines MSC-BS messages, message
sequencing, and mandatory timers at the base station and the mobile switching center. Call pro-
cessing, radio resource management, mobility management, and transmission facilities manage-
ment are separate functions that are supported by the applications layer (see Fig. 9-3).
The MSC-BS interface (A-Interface) utilizes point-to-point signaling between the BS and
the MSC. The normal routing situation is that there are one or more signaling links available
between the BS and the MSC, and these constitute a link set. They run in a load-sharing mode,
and the change-over and change-back procedures are supported between these signaling links.
Load sharing is performed on the BS with more than one signaling link by means of the Signal-
ing Link Selection (SLS) field.
The underlying transport mechanism for the applications layer is ISDN with the physical
layer specified by American National Standard Institute (ANSI) T1.101, the Message Transfer
Part (MTP) specified by ANSI T1.111, and the Signaling Connection Control Part (SCCP) spec-
ified by ANSI T1.112. The physical interface supports one or more 1.544-Mbps digital transmis-
sion facilities, each providing twenty-four 56-kbps or 64-kbps channels. Each channel can be
used for traffic or for signaling. The MTP and the SCCP support only signaling messages, while
Supplementary Services
Transmission Facilities
Transmission Facilities
Radio Resource
Radio Resource
Call Processing
Call Processing
Management
Management
Management
Management
Management
Management
Mobility
Mobility
SCCP SCCP
MTP MTP
Physical Facility
the physical layer supports both signaling messages and traffic messages. Traffic messages carry
voice transmission. TIA IS-634 allows the transcoder (vocoder) to reside either at the base sta-
tion or “very near” to the mobile switching center. In the first case, an entire DS0* (64-kbps)
connection is required for each call, while the second case does not necessitate an entire DS0
connection.
At the applications layer, the call processing and mobility management functions are con-
nected between the mobile station and the mobile switching center, while the radio resource
management and the transmission facilities management functions are connected between the
base station and the mobile switching center. Accordingly, the Base Station Application Part
(BSAP), which is the applications-layer signaling protocol, is divided into two subapplications
parts. The first is called the BS Management Application Part (BSMAP). BSMAP messages are
sent between the base station and the mobile switching center. The second is the Direct Transfer
Application Part (DTAP) in which messages are sent between the mobile station and the mobile
switching center. The base station acts as a transparent conduit for DTAP messages. The base
station merely maps the messages going to/from the mobile switching center into the appropri-
ate air interface signaling protocol, e.g., TIA IS-95A. This approach simplifies the role of the
base station for call processing and mobility management.
The DTAP is used to transfer call control and mobility management signaling messages to
and from the MS. The BSMAP supports other procedures between the MSC and the BS related
to the MS, or to a cell within the BS, or to the whole BS.
The base station associates the DTAP messages with a particular mobile station and call
using a transaction identification. BSAP messages are transferred over an SCCP connection. The
DTAP and BSMAP layer 3 messages between the base station and the mobile switching center
are contained in the user data field of the SCCP frames. The data field is supported in Connec-
tion Request (CR), Connection Confirm (CC), Released (RLSD), and Data (DT) SCCP frames
for mobile stations having one or more active transactions. The layer 3 user data field is parti-
tioned into three components (see Fig. 9-4):
1. BSAP message header
2. Distribution data unit (this component includes the length indicator and the Data Link
Connection Identifier [DLCI]—applies only to DTAP messages)
3. Layer 3 message
The BSAP message header consists of the message discrimination and the data link con-
nection identifier, which is applicable only for DTAP messages. The D-bit (bit 0) of the message
discrimination octet is set to 1 for a DTAP message and is set to 0 for a BSMAP message. The
distribution data unit consists of the length indicator octet, which gives the number of octets fol-
lowing the length indicator.
DTAP messages are applicable only to mobility management and call processing (includ-
ing supplementary services) functions, while BSAP messages are associated with radio
* A DS0 is a 64-kbps Pulse Code Modulation (PCM) transport facility and is a single 64-kbps time slot on a T1 carrier.
158 Ch. 9 • Signaling Applications in IS-95 CDMA
Message Message
Discriminator Discriminator
DLCI
Length Length
Indicator Indicator
Layer 3 Layer 3
Message Message
resource management and to call processing (to a lesser degree). Each DTAP message contains
the protocol discriminator octet, which identifies the associated procedure, i.e., call control,
mobility management, radio resource management, and facilities management. All DTAP and
BSMAP messages are identified by the message-type octet.
The remaining part of this section provides greater detail for each function supported by
the BSAP.
MSC
Transcoder
BSC
BTS BTS
• Distribute speech/data on the forward traffic channel to all BTSs associated with a call.
During a soft handoff, multiple BTSs are simultaneously assigned to the call. The XC
selects the best speech/data frame from all the BTSs associated with the call on the
reverse traffic channel. This implies that signal quality characteristics of the speech/
data frame are provided to the transcoder.·
• Decode QCELP* format and change to PCM format for voice frames sent on the
reverse traffic channel. If the call is a data call, this task is bypassed.
• Decode PCM format and change to QCELP format for voice frames sent on the for-
ward traffic channel. If the call is a data call, this task is bypassed.
• Rate adapt voice frames to fully utilize the transmission bandwidth of the assigned ter-
restrial circuits. This task is bypassed for data calls.
• Rate adapt compressed voice PCM format into a circuit-switched subrate channel on a
DS0 facility. One common compression approach is Adaptive Differential Pulse Code
Modulation (ADPCM). Compression utilizes the fact that voice activity is less than
100% of the total duration. Typically, the actual voice activity is approximately 50%.
• Provide a control capability of inserting blank-and-burst or dim-and-burst signaling
into the voice transmission on the forward traffic channel.
The transcoder is considered as a logical part of the BS, although the transcoder can be
physically located at the BS, or at the MSC, or somewhere between the BS and the MSC. The
* Qualcomm Code-Excited Linear Prediction (QCELP) is the CDMA speech processing algorithm that is specified in
TIA IS-96A. The algorithm is based upon code-excited linear prediction. See chapter 3 for more information.
160 Ch. 9 • Signaling Applications in IS-95 CDMA
terrestrial facility connects the transcoder to the MSC. The terrestrial facility may be full-rate
(56 kbps or 64 kbps), subrate, PSTN, bypass, or PSTN/bypass. If only the BS is associated with
a call, the terrestrial facility is connected to the PSTN. If a call is configured for a soft handoff
between two base stations, another terrestrial facility is required to connect the transcoder at the
target BS with the transcoder at the source BS. This terrestrial facility may be a full-rate, subrate,
bypass, or bypass/PSTN facility. The connection between the transcoder and the BS is not
addressed in TIA IS-634.
The transcoder and the BS may be physically co-located or may be externally connected
by a full-rate or subrate facility if the transcoder is located near or at the MSC. The BSC may
support multiple BTSs. Thus, if a call is in a soft handoff using only BTSs connected to a given
BSC, no messaging between the MSC and the BS is necessary.
BTSs are uniquely identified by the Cell Global Identification (CGI). CGI is composed of
four components:·
• Mobile Country Code (MCC)
• Mobile Network Code (MNC)
• Location Area Code (LAC)
• Cell Identity (CI)
TIA IS-634 supports addressing modes so that a BTS can be identified by the CGI, by the
CI, by a combination of the LAC, MCC, and MNC, or by the associated BS.
Table 9-5 summarizes the message types that are associated with transmission facilities
management.
The MTP provides a mechanism that makes the transfer of signaling messages reliable.
The SCCP is used to provide a referencing mechanism to identify a particular transaction relat-
ing to, for instance, a particular call. The SCCP can also enhance the message routing for opera-
tion and maintenance information.
At the BS, only messages with a correct Destination Point Code (DPC) are accepted.
Other messages are discarded. At an MSC (with the capability of acting as a signal transfer point
[STP]) each message received from a BS signaling link is passed through a screening function
which checks that the DPC of the message is the same as the signaling point (SP) code of the
exchange. If it is the same, the message is sent to the normal MTP message-handling functions;
otherwise, the message is discarded. The SP code for signaling may be included in the national
SP code scheme or in a separate signaling network.
The BS exchanges signaling messages only with its MSC, where a protocol conversion
may be needed in some cases. Therefore, no SCCP translation function is required in the MS
between the national and the local SCCP and the MTP within the MSC area.
Several functions of the SCCP (such as error detection, receipt confirmation, and flow
control) are not used on the MSC-BS interface. The segmenting/reassembling function is used if
the total message length exceeds the MTP’s maximum allowed message length.
BS MSC
BSAP BSAP
DTAP BSMAP DTAP BSMAP
IS-634 IS-634
SCCP SCCP
MTP MTP
Physical Physical
A-Interface
Figure 9-6 A-Interface Signaling Protocol Stack
The initial messages exchanged in call setup are used to establish an SCCP connection for
subsequent signaling communications relating to the call. A new connection is established when
individual information related to an MS transaction has to be exchanged between a BS and an
MSC and no such transaction exists between the MSC and that BS. We need to distinguish the
reasons for connection establishment:
1. A new transaction (e.g., location update, incoming or outgoing call) is initiated on the
radio path.
2. Following an access request made by the MS on the random access channel, the con-
nection establishment is then initiated by the MSC.
The BS initiates a connection establishment when it receives the first layer 3 mes-
sage from the MS. The message contains the mobile identity parameter (MIN, ESN, or
IMSI). The BS then constructs the first MSC-BS Interface BSMAP message (Complete
Layer 3 Information) which includes one of the appropriate DTAP messages (Location
Update Request, CM Service Request, or Paging Response) depending on whether the
MS is accessing the network for the purpose of registration, call origination, or call ter-
mination. The Complete Layer 3 Information message is sent to the MSC in the user
data field of the SCCP Connection Request message. The Complete Layer 3 Informa-
tion message includes cell identity and the layer 3 message that was received from the
mobile.
At the reception of the SCCP Connection Request message, the MSC may check,
based on the received identity, whether another association already exists for the same
MS. If that is the case, the connection establishment is refused. Otherwise, an SCCP
Connection Confirm message is sent back to the BS. This message may optionally con-
tain a BSMAP or DTAP message in the user data field (Fig. 9-7).
3. The MSC decides to perform an inter-BS handoff. The connection establishment is
then initiated by the MSC.
The connection establishment is undertaken by the MSC as soon as the MSC
decides to perform an inter-BS handoff. An SCCP Connection Request message is sent
166 Ch. 9 • Signaling Applications in IS-95 CDMA
BS MSC
Timer T3230
to the BS. The user data field of this message may contain the BSMAP Handoff Request
Message. However, it is preferable to transfer the layer 3 messages in the user data field
of the SCCP Connection Request in order to complete the establishment of the relation-
ship between the radio channel requested and SCCP connection as soon as possible.
When it receives the SCCP Connection Request message, the BS performs the
necessary checking and, in the successful case, reserves a radio channel for the
requested handoff. An SCCP Connection Confirm message is also returned to the MSC
and may contain the BSMAP Handoff Request Acknowledge message in the user field
(Fig. 9-8).
This procedure is initiated by the MSC in normal conditions for all calls. A con-
nection is released when a given signaling connection is no longer required. This may
happen in normal cases:
◆ At the end of a transaction (call, location update)
◆ After completion of a successful external handoff—the connection with the old
BS is released.
The MSC/BS sends an SCCP released (RLSD) message. The user data field of
the message is optional and may contain a transparent layer 3 message (e.g., DTAP) or
be empty.
BS MSC
When receiving this message, the BS/MSC releases all the radio resources allo-
cated to the relevant MS, if there are still any left, and sends an SCCP release complete
(RLC) back to the MSC/BS.
The normal release of SCCP connections is initiated by MSC. Under abnormal
conditions, the SCCP connection may be released by the BS in order to clear resources.
Whenever an SCCP connection is abnormally released, all resources associated with
that connection are cleared. Abnormal release could result from, for example, resource
failure, protocol error, or unexpected receipt of an SCCP released (RLSD) or SCCP
RLC command.
The SCCP local reference number (source/destination) is a 3-byte element inter-
nally chosen by the MSC or BS to uniquely identify a signaling connection. In the
direction MSC to BS, the source local reference is selected by the MSC and the desti-
nation local reference is chosen by the BS. In the direction BS to MSC, the source local
reference is chosen by the BS and the destination local reference is chosen by the MSC.
Note that it is the responsibility of the BS and MSC to insure that no two calls have
identical SCCP local reference numbers.
9.4 Roaming
Roaming enables mobile stations to receive services outside of their home areas. When an MS is
roaming, registration, call origination, and call delivery will take extra steps. Whenever the VLR
tries to retrieve MS data, and data is not available, then the VLR sends a message to the appro-
priate HLR to retrieve the necessary data. The data consists of IMSI-to-MIN conversion, service
profiles, SSD for authentication, and other data needed to process calls. The most logical time to
retrieve this data is when the MS registers with the system.
Once the data on a roaming MS is stored in the VLR, then call processing for any originat-
ing services (basic or supplementary) is identical to that of home MS. However, there may be
times when the MS originates a call before registration has been accomplished or when the VLR
data is not available. At those times, an extra step will be added for the VLR to retrieve the data
from the HLR. Thus any originating service has two optional steps where the VLR sends a mes-
sage (using IS-41 signaling over SS7) to the HLR requesting data on the roaming MS, and the
HLR returns a message with the proper call information.
Call delivery is not possible to an unregistered MS since the network does not know where
the MS is located. Once the MS is registered with a system, then call delivery to the roaming MS
is possible. This section will discuss call delivery to roaming MS in detail.
There are two types of call delivery to roaming MS—when the MS has a geographic-
based directory number (indistinguishable from a wireline number), and when the MS has a
nongeographic number.
We will describe the call flows for both operations.
When the MS has a geographic number, then the MSC is assigned a block of numbers that
are within the local numbering plan for the area of the world where the MSC is located. Call
168 Ch. 9 • Signaling Applications in IS-95 CDMA
routing to the MS is then done according to the procedures for that of a wireline telephone.* If an
MS associated with an MSC is not in its home area, the MSC will query the HLR for the loca-
tion of the MS. The MSC then invokes call forwarding to the MSC at the MS’s location, and the
connection is made to the second MSC where call-terminating services are delivered (refer to
the procedures in section 8.2.4). This procedure is inefficient because it results in two sets of net-
work connections—originating switch to home MSC, and home MSC to visited MSC.
Call delivery to a roaming MS is a cooperative effort among the home and visited MSCs,
the VLR and HLR, and the radio system. The detailed call flow steps, for call delivery to a roam-
ing MS with a geographic directory number (see Fig. 9-9 for the call flow diagram) are:
1. A user in the worldwide phone network (wired or wireless) dials the directory number
of the MS.
2. The originating switch sends an SS7 initial address message (IAM) to the home MSC.
3. The home MSC queries the HLR for the location of the MS.
4. The HLR returns the location of the visited system.
5. The MSC invokes call forwarding to the MSC in the visited system, and the forwarding
(home) MSC switch sends an SS7 IAM to the visited MSC.
6. Call processing continues to the terminating call flow (see Fig 8.12).
User
1.
Dials Call
2. SS7 IAM
3. HLR Query
HLR
4.
Response
5. SS7 IAM
Figure 9-9 Call Termination to a Roaming Mobile Station with a Geographic Number
*For example, in Chicago, 312-944-XXXX is used by the local cellular provider for cellular phones in the
downtown area. The wireline network routes calls to those numbers in a normal fashion, and calls terminate
on the cellular switch.
Roaming 169
When the MS has a nongeographic number, then calls can be directed from an originating
switch directly to the visited switch. Call delivery to a nongeographic number requires the origi-
nating switch to recognize the number as a nongeographic number and do special call process-
ing for routing. This special processing is known as Intelligent Network (IN) processing. If the
originating switch does not support IN, then it will route the call to a switch that supports IN.
With IN support, the originating switch will recognize the nongeographic number and send an
SS7 message to the HLR with a request for the location of the MS. The HLR will return a tem-
porary directory number (on the visited MSC) that can be used to route to the MS in the visited
system. Calls then proceed according to normal termination. Call delivery to a roaming MS with
a nongeographic number is, therefore, a cooperative effort between the visited MSC, the VLR
and HLR, and the radio system. The detailed call flow steps for call delivery to a roaming MS
with a nongeographic directory number (see Fig. 9-10 for call flow) are:
1. A user in the worldwide phone network (wired or wireless) dials the directory number
of the MS.
2. The originating switch recognizes the number as a nongeographic number and sends an
SS7 query message to the HLR at the home MSC.
3. The HLR returns the location of the visited system with a directory number to use for
further call processing.
4. The originating switch sends an SS7 IAM to the visited MSC.
5. Call processing continues to the terminating call flow (see Fig 8.12).
User
1.
Dials Call
2. SS7 HLR
Query
3. SS7 HLR
Response
4. SS7 IAM
Figure 9-10 Call Termination to a Roaming Mobile Station with a Nongeographic Number
170 Ch. 9 • Signaling Applications in IS-95 CDMA
answered, the user can switch between the calls until one or more parties hang up. When either
party hangs up, then the call reverts to a normal (non-call-waiting) call. If the MS user hangs up,
then both calls are cleared according to normal call-clearing functions.
The detailed call flow steps for the delivery of call waiting to a mobile station (see Fig. 9-
11) are:
1. User dials a call.
2. The originating switch sends an SS7 IAM to the MSC.
3. The MSC queries the VLR.
4. The VLR returns with a location of the MS that is within the serving system. If the MS
is not inside the serving system, then the call is forwarded to the serving MSC.
User
1.
Dials Call
2. SS7 IAM
3. VLR Query
4. VLR Response
MSC Applies
5. Call Waiting Tone
6. Flash
7. ISDN Hold
MSC Puts
8. Call 1 on Hold
Connects Call 2
9. ISDN Hold Ack
10. Flash
MSC Puts
12. Call 2 on Hold
Connects Call 1
13. ISDN Hold Ack
14. Drop
MSC Drops
16. Current Call and
Connects Other Call
17. ISDN Drop Ack
5. The MSC determines that the MS is busy, subscribes to call waiting, and thus applies
the call waiting tone.
6. The user presses the FLASH button (may be SEND on some MSs) to answer the call
waiting indication, and the MS sends a Flash message to the base station.
7. The base station sends an ISDN Hold message to the MSC.
8. The MSC puts the first call on hold and connects the second call.
9. The MSC sends a Hold Acknowledge message to the base station.
10. The user presses the FLASH button (may be SEND on some MSs) to talk to caller 1,
and the MS sends a Flash message to the base station.
11. The base station sends an ISDN Hold message to the MSC.
12. The MSC puts the second call on hold and connects the first call.
13. The MSC sends a Hold Acknowledge message to the base station.
14. The user wants to drop the current call (either 1 or 2) and pushes the DROP (or END)
key, and the MS sends a Drop message to the base station.
15. The base station sends an ISDN Drop message to the MSC.
16. The MSC drops the current call and connects the other call (the one currently on hold).
17. The MSC sends an ISDN Drop Acknowledge message to the base station.
9.4.2 Handoffs
A wireless telephone (mobile station) moves around a geographic area. When the station is
idle, it periodically reregisters with the system. When a call is active, then the combined mobile
station, the base station, and the MSC manage the communications between the base station and
mobile station so that good radio link performance is maintained. The process whereby a mobile
station moves to a new traffic channel is called handoff. The original analog cellular system pro-
cessed handoffs by commanding the mobile station to tune to a new frequency. For analog cellu-
lar, the handoff process caused a small break in time on the voice path and a noticeable “click”
was heard by both parties in the telephone call. For data modems, the click often caused data
errors or loss of data synchronization.
For CDMA systems, the characteristics of spread spectrum communications permit the
system to simultaneously receive mobile transmissions on two or more base stations. In addi-
tion, the mobile station can simultaneously receive the transmissions of two or more base sta-
tions. With these capabilities, it is possible to process a handoff from one base station to another,
or from one antenna face to another on the same base station, without any perceptible distur-
bance in voice or data communications.
During handoff, the signaling and voice information from multiple base stations must be
combined (or bridged) in a common point with decisions made on the quality of the data. Simi-
larly, voice and signaling information must be sent to multiple base stations and the mobile sta-
tion must combine the results. The common point could be anywhere in the network, but it is
typically at the mobile switching center. The call flows described here for handoff assume the
MSC contains the bridging circuitry.
172 Ch. 9 • Signaling Applications in IS-95 CDMA
In CDMA, both the base station and the mobile station monitor the performance of the
radio link and can request handoffs. Handoffs requested by a mobile station are called mobile-
assisted handoffs; those requested by the base station are called base-station assisted handoffs.
Either side can initiate the handoff process whenever the following triggers occur:
• Base station traffic load not balanced. The network can monitor loads at all base
stations and trigger handoffs to balance loads between them to achieve higher traffic
efficiency.
• Distance limits exceeded. Since all base stations and mobile stations are synchronized,
both sides can determine base-to-mobile range. When the distance limit is exceeded,
either side can request a handoff.
• Pilot signal strength below threshold. When the received signal strength of the pilot
signal falls below a threshold, either side can initiate a handoff.
• Power level exceeded. When the base station commands a mobile station to increase
its power and the maximum power level of the mobile station is exceeded, then either
side can request a handoff.
The mobile station determines the parameters for the handoff request from the System
Parameters message in the CDMA system. The message is transmitted on the system’s paging
channel.
As we have described, the handoff process is a cooperative effort between the old and new
base stations, the mobile station, and the MSC. The following call flows are based on a frame
relay A-Interface [9] between the base station and the MSC and are included as representative
call flows. Actual call flows may be either standard or proprietary to an equipment vendor.
The detailed call flow steps for a CDMA soft handoff (beginning) (see Fig. 9-12) are:
1. The mobile station determines that another base station has sufficient pilot signal to be
a target for handoff.
2. The mobile station sends a Pilot Strength Measurement message to the serving base
station.
3. The serving base station sends an inter-BS Handoff Request message to the MSC.
4. The MSC accepts the handoff request and sends an inter-BS Handoff Request message
to the target base station.
5. The target base station establishes communication with the mobile station by sending it
a Null Traffic message.
6. The target base station sends a Join Request message to the MSC.
7. The MSC conferences the connections from the two base stations so the handoff can be
processed without a break in the connection (i.e., soft handoff) and sends a Join
Acknowledge message to the target base station.
8. The target base station sends an inter-BS Handoff Acknowledgment message to the
MSC.
9. The MSC sends an inter-BS Handoff Acknowledgment message to the serving base
station.
Roaming 173
Decision to
1.
Hand Off
2. Pilot Strength
Measurement
3. Inter_BS HO Request
4. Inter_BS HO Request
5. Null Traffic
6. Join_REQ
7. Join_ACK
8. Inter_BS_HO_ACK
9. Inter_BS_HO_ACK
12. HO_INFO
13. HO_INFO_ACK
10. The serving base station sends a Handoff Direction message to the mobile station.
11. The mobile station sends a Handoff Complete message to the serving base station.
12. The serving base station sends a Handoff Information message to the MSC.
13. The MSC confirms the message with a Handoff Information Acknowledgment message.
14. The target base station sends a Pilot Measurement Request Order message to the
mobile station.
15. The mobile station sends a Pilot Strength Measurement message to the target base
station.
The mobile unit is now communicating with two base stations (i.e., it is in soft handoff).
Both base stations must communicate with the MSC, which then uses the highest quality signals
from the two base stations and sends transmitted signals to both base stations.
After the mobile station is in soft handoff, one of the signals may fall below a predeter-
mined threshold (based on information sent in overhead messages on the control channel) and
the mobile stations will request that one base station be removed from the connection. The
detailed call flow steps for a CDMA soft handoff with the serving base station dropping off (see
Fig. 9-13) are:
174 Ch. 9 • Signaling Applications in IS-95 CDMA
Decision to
1.
Hand Off
2. Pilot Strength
Measurement
3. Handoff Direction
4. Handoff Comp
5. Inter_Prim_XFER
6. Inter_Prim_XFER_ACK
7. HO_INFO
8. HO_INFO_ACK
11. Remove_REQ
12. Remove_ACK
1. The mobile station determines that the serving base station has insufficient pilot signal
to continue to be a base station in the soft handoff.
2. The mobile station sends a Pilot Strength message to the serving base station. The mes-
sage requests that the base station drop off from the handoff.
3. The serving base station sends a Handoff Direction message to the mobile station that
indicates which base station is to be dropped from the soft handoff (in this case, the
serving base station).
4. The mobile station sends a Handoff Complete message to the serving base station.
5. The serving base station sends an Interface Primary Transfer message to the target base
station with relevant call record information.
6. The target base station confirms the message with an Interface Primary Transfer
Acknowledge message.
7. The target base station then sends a Handoff Information message to the MSC.
8. The MSC sends a Handoff Information Acknowledge message to the target base
station.
9. The target base station sends a Pilot Measurement Request Order message to the
mobile station.
Roaming 175
10. The mobile station sends a Pilot Strength Measurement message to the target base sta-
tion.
11. The old serving base station sends a Remove Request message to the MSC that
requests that the base station be dropped from the connection.
12. The MSC confirms the message by sending a Remove Acknowledge message to the old
serving base station.
The mobile station is now communicating with the target base station (new serving base
station). If additional soft handoffs are needed, the handoff beginning procedure is repeated.
The procedures to drop a target base station from a soft handoff are similar to those that
drop the serving base station. The detailed call flow steps for a CDMA soft handoff with the tar-
get base station dropping off (see Fig. 9-14) are:
1. The mobile station determines that the target base station has an insufficient pilot signal
to continue to be a base station in the soft handoff.
Decision to
1.
Hand Off
2. Pilot Strength
Measurement
3. Handoff Direction
4. Handoff Comp
5. Inter_BS_Remove
6. Inter_BS_Remove
7. HO_INFO
8. HO_INFO_ACK
9. Remove_REQ
10. Remove_ACK
11. Inter_BS_Remove_ACK
12. Inter_BS_Remove_ACK
2. The mobile station sends a Pilot Strength message to the serving base station. The mes-
sage requests that the target base station drop off from the handoff.
3. The serving base station sends a Handoff Direction message to the mobile station that
indicates which base station is to be dropped from the soft handoff (in this case, the tar-
get base station).
4. The mobile station sends a Handoff Complete message to the serving base station.
5. The serving base station sends an Inter-BS Remove message to the MSC.
6. The MSC sends an Inter-BS Remove message to the appropriate base station (in this
case, the target base station).
7. The serving base station then sends a Handoff Information message to the MSC.
8. The MSC sends a Handoff Information Acknowledge message to the serving base sta-
tion.
9. The target base station sends a Remove Request message to the MSC.
10. The MSC sends a Remove Acknowledge to the target base station.
11. After the target base station removes its resource from the call, it sends an Inter-BS
Remove Acknowledge message to the MSC.
12. The MSC sends a Remove Acknowledge message to the serving base station.
13. The serving base station sends a Pilot Measurement Request Order message to the
mobile station.
14. The mobile station sends a Pilot Strength Measurement message to the serving base
station.
The mobile station is now communicating only with the serving base station. If additional
soft handoffs are needed, the handoff beginning procedure is repeated.
MS BS MSC
Origination Message
1
ADD Deliver
3
Data Burst (OTA)
4
Layer 2 ACK/Reject Order
5
with Layer 2 ACK ADD Deliver ACK
6
Rejection Order
7
Rejection Order
8
Data Burst (OTA)
9
Layer 2 ACK
10
ADD Deliver
11
SSD Update
12 Optional
Terminal Authentication
13 Optional
2. The MSC and BS use a normal call setup procedure to establish the OTASP call.
3. Upon request from Over-the-Air Function (OTAF), the MSC encapsulates an OTASP
data message within an ADD Deliver message and sends it to the BS.
4. The BS extracts the OTASP data message, places it in the CDMA Data Burst message,
and transmits it over the traffic channel to the MS.
5. The MS may respond with a Layer 2 ACK or a Reject Order containing a Layer 2 ACK
acknowledging the Data Burst message.
6. When the BS receives a Layer 2 ACK, or when a BS receives a Reject Order containing
a Layer 2 ACK acknowledging the Data Burst message from the MS in response to an
ADD Deliver message containing a Tag information element, it sends an ADD Deliver
ACK message to the MSC with the corresponding Tag value.
7. The MS may return a Reject Order message.
178 Ch. 9 • Signaling Applications in IS-95 CDMA
8. The BS will send a Rejection message to the MSC to convey the information contained
in the Reject Order message.
9. The OTASP application in the MS responds by sending an OTASP data message. The
MS places the OTASP data message in the CDMA Data Burst message and transmits it
over the traffic channel to the BS.
10. Upon reception of the CDMA Data Burst message, the BS responds with a Layer 2
ACK.
11. The BS extracts the OTASP data message and places it in the ADDS Deliver message
to the MSC. Steps 12 through 15 are optional.
—————————————
12. After the A-key has been derived from information transferred via the ADDS Deliver
message, an SSD Update procedure over the traffic channel may also be used to
exchange authentication information (RANDSSD, RANDBS, AUTHBS) (see chapter
11).
13. After an SSD Update procedure, terminal authentication needs to be performed to gen-
erate the cipher key that will be used for privacy (see chapter 11).
14. After terminal authentication, Privacy Mode procedures over the traffic channel may
also be applied to specify the use of either Signaling Message Encryption (SME) or
Privacy for the call.
15. Multiple forward and reverse OTASP messages can be sent between the OTASP end
point in the network and the MS. The MSC and the BS will transfer the messages
whenever they are received.
—————————————
16. Once the OTASP service programming has been successful, the call can be cleared
using a regular Call Clear procedure (see chapter 8).
9.5 Summary
First this chapter described the layering concept used to develop the protocols for the IS-95
CDMA and followed with a discussion of the signaling applications for a CDMA wireless tele-
phony system. Since end-to-end call flows are not presented in any of the standards but are dis-
tributed across several standards, we described several basic and supplementary call flows.
An important component of wireless services is the ability to find and place calls to a
roaming mobile station. Most mobile stations have a geographic number, but many will have
nongeographic numbers in the future, so we described call flows for both. Geographic numbers
are phone numbers that are located to a specific point on the worldwide phone system. Nongeo-
graphic numbers do not have a location associated with them, and the network maintains a data-
base of the location of the phone. Additional routing steps are necessary to place a call to a
mobile station with a nongeographic number.
While cellular and PCS systems (and CDMA, in particular) have a rich set of supplemen-
tary features, the most common feature is call waiting. The various standards describe additional
References 179
procedures for all of the basic and supplementary services. We encourage you to consult the
standards [1–7] for additional information.
Finally, since the CDMA system processes handoffs in a different way than analog cellular
or TDMA cellular/PCS systems, we described the soft handoff process for CDMA and present
call flows for soft handoff, beginning and ending. Also discussed was the Over-the-Air Service
Provisioning (OTASP) procedure.
9.6 References
1. Committee T1, “Stage 2 Service Description for Circuit Mode Switched Bearer Services,”
Draft T1.704.
2. Committee T1—Telecommunications, “A Technical Report on Network Capabilities, Archi-
tectures, and Interfaces for Personal Communications,” T1 Technical Report #34, May
1994.
3. EIA/TIA-553, “Cellular System Mobile Station–Land Station Compatibility Specification.”
4. Garg, V. K., and Wilkes, J. E., Wireless and Personal Communications Systems, Prentice
Hall PTR, Upper Saddle River, NJ, 1996.
5. Report of the Joint Experts Meeting on Privacy and Authentication for PCS, Phoenix, Ari-
zona, November 8–12, 1993.
6. TIA Interim Standard, IS-41 C, “Cellular Radio Telecommunications Intersystem Opera-
tions.”
7. TIA IS-95A, “Mobile Station–Base Station Compatibility Standard for Dual Mode Spread
Spectrum Cellular System.”
8. TIA IS-634, “MSC-BS Interface for 800 MHz,” 1995.
9. TR-45 Contribution, “Frame Relay A-Interface.”
This page intentionally left blank
C H A P T E R 1 0
10.1 Introduction
Soft handoff is different from the traditional hard-handoff process. With hard handoff, a definite
decision is made on whether to hand off or not. The handoff is initiated and executed without the
user attempting to have simultaneous traffic channel communications with the two base stations.
With soft handoff, a conditional decision is made on whether to hand off. Depending on the
changes in pilot signal strength from the two or more base stations involved, a hard decision will
eventually be made to communicate with only one. This normally happens after it is evident that
the signal from one base station is considerably stronger than those from the others. In the interim
period, the user has simultaneous traffic channel communication with all candidate base stations.
It is desirable to implement soft handoff in power-controlled CDMA systems because
implementing hard handoff is potentially difficult in such systems. A system with power control
attempts to dynamically adjust transmitter power while in operation. Power control is closely
related to soft handoff. IS-95 uses both power control and soft handoff as an interference-
reduction mechanism. Power control is the main tool used in IS-95 to combat the near-far prob-
lem. It is theoretically unnecessary to have power control if one can successfully implement a
more intelligent receiver than that used in IS-95, which is the subject of the field of multiuser
detection (MUD), a feature being proposed for the 3G CDMA systems. Power control is neces-
sary in order for a CDMA system to achieve a reasonable level of performance in practice. The
use of power control in the CDMA system necessitates the use of soft handoff when the origi-
nal and new channels occupy the same frequency band. For power control to work properly, the
mobile must attempt to be linked at all times to the base station from which it receives the
strongest signal. If this does not happen, a positive power control feedback loop could inadvert-
ently occur, causing system problems. Soft handoff can guarantee that the mobile is indeed
linked at all times to the base station from which it receives the strongest signal, whereas hard
handoff cannot guarantee this.
181
182 Ch. 10 • Soft Handoff and Power Control in IS-95 CDMA
1. Intersector or softer handoff. The mobile communicates with two sectors of the same
cell (see Fig. 10-1). A RAKE receiver at the base station combines the best versions of
the voice frame from the diversity antennas of the two sectors into a single traffic frame.
2. Intercell or soft handoff. The mobile communicates with two or three sectors of differ-
ent cells (see Fig. 10-2). The base station that has the direct control of call processing
Cell A Cell B
α α α
α
γ
γ β β
β β
γ γ
α
Cell A Cell B
γ
β
Cell C
during handoff is referred to as the primary base station. The primary base station can
initiate the forward control message. Other base stations that do not have control over
call processing are called the secondary base stations. Soft handoff ends when either
the primary or secondary base station is dropped. If the primary base station is dropped,
the secondary base station becomes the new primary for this call. A three-way soft
handoff may end by first dropping one of the base stations and becoming a two-way
soft handoff.
The base stations involved coordinate handoff by exchanging information via
SS7 links. A soft handoff uses considerably more network resources than the softer
handoff.
3. Soft-softer handoff. The mobile communicates with two sectors of one cell and one
sector of another cell (see Fig. 10-3). Network resources required for this type of hand-
off include the resources for a two-way soft handoff between cell A and B plus the
resources for a softer handoff at cell B.
4. Hard handoff. Hard handoffs are characterized by the break-before-make strategy. The
connection with the old traffic channel is broken before the connection with the new
traffic channel is established. Scenarios for hard handoff include
◆ Handoff between base stations or sectors with different CDMA carriers
◆ Change from one pilot to another pilot without first being in soft handoff with the
new pilot (disjoint active sets)
◆ Handoff from CDMA to analog, and analog to CDMA
◆ Change of frame offset assignment—CDMA traffic frames are 20 ms long. The
start of frames in a particular traffic channel can be at 0 time in reference to a sys-
tem or it can be offset by up to 20 ms (allowed in IS-95). This is known as the
frame offset. CDMA traffic channels are assigned different frame offset to avoid
congestion. The frame offset for a particular traffic channel is communicated to
the mobile. Both forward and reverse links use this offset. A change in offset
γ
γ α
β
β
Cell A Cell B
Figure 10-3 Soft-Softer Handoff
184 Ch. 10 • Soft Handoff and Power Control in IS-95 CDMA
assignment will disrupt the link. During soft handoff the new base station must
allocate the same frame offset to the mobile as assigned by the primary base sta-
tion. If that particular frame offset is not available, a hard handoff may be
required. Frame offset is a network resource and can be used up.
Each pilot is assigned a different offset of the same short PN code. The mobile search for
pilots is facilitated by the fact that the offsets are the integer multiples of a known time delay (64
chips offset between adjacent pilots). All pilots in a pilot set have the same CDMA frequency
assignment. The pilots identified by the mobile, as well as other pilots specified by the serving
sectors (neighbors of the serving base stations/sectors), are continuously categorized by the
mobile into four groups.
• Active set. It contains the pilots associated with the forward traffic channels (Walsh
codes) assigned to the mobile. Because there are three fingers of the RAKE receiver in
the mobile, the active set size is a maximum of three pilots. IS-95 allows up to six pilots
in the active set, with two pilots sharing one RAKE finger.The base station informs the
mobile about the contents of the active set by using the Channel Assignment message
and/or the Handoff Direction message (HDM). An active pilot is a pilot whose paging
or traffic channels are actually being monitored or used.
• Candidate set. This set contains the pilots that are not currently in the active set. How-
ever, these pilots have been received with sufficient signal strength to indicate that the
associated forward traffic channels could be successfully demodulated. Maximum size
of the candidate set is six pilots.
• Neighbor set. This set contains neighbor pilots that are not currently in the active or the
candidate set and are likely candidates for handoff. Neighbors of a pilot are all the sec-
tors/cells that are in its close vicinity. The initial neighbor list is sent to the mobile in
the System Parameter message on the paging channel. The maximum size of the neigh-
bor set is 20.
• Remaining set. This set contains all possible pilots in the current system, excluding
pilots in the active, candidate, or neighbor sets.
While searching for a pilot, the mobile is not limited to the exact offset of the short PN
code. The short PN offsets associated with various multipath components are located a few chips
away from the direct path offset. In other words, the multipath components arrive a few chips
later relative to the direct path component. The mobile uses the search window for each pilot of
the active and candidate set, around the earliest arriving multipath component of the pilot.
Search window sizes are defined in number of short PN chips. The mobile should center the
search window for each pilot of the neighbor set and the remaining set around the pilot’s PN off-
set using the mobile time reference.
• SRCH_WIN_A: search window size for the active and candidate sets
• SRCH_WIN_N: search window size for the neighbor set
• SRCH_WIN_R: search window size for the remaining set
186 Ch. 10 • Soft Handoff and Power Control in IS-95 CDMA
10.4.1 SRCH_WIN_A
SRCH_WIN_A is the search window that the mobile uses to track the active and candidate
set pilots. This window is set according to the anticipated propagation environment—it should
be large enough to capture all usable multipath signal components of a base station, and at the
same time it should be as small as possible in order to maximize searcher performance.
EXAMPLE 10.1
Consider the propagation environment of a CDMA network, where the signal with a direct path trav-
els 1 kilometer (km) to the mobile, whereas the multipath travels 5 km before reaching the mobile.
What should be the size of SRCH_WIN_A?
1000
Direct path travels a distance of ------------ = 4.1 chips
244
5000
Multipath travels a distance of ------------ = 20.5 chips
244
The difference in distance traveled between the two paths = 20.5 – 4.1 = 16.4 chips
The window size ≥ 2 × 16.4 = 32.8 chips
Use window size = 33 chips
EXAMPLE 10.2
Consider cells A and B separated by a distance of 12 km. The mobile travels from cell A to cell B.
The RF engineer wishes to contain the soft handoff area between points X and Y located at distance
6 and 10 km from cell A (see Fig. 10-4). What should be the search window size?
At point X the mobile is 6000/244 = 24.6 chips from cell A
At point X the mobile is 10,000/244 = 41.0 chips from cell B
Path difference = 41.0 – 24.6 = 16.4 chips
At point Y the mobile is 10,000/244 = 41.0 chips from cell A
At point Y the mobile is 6000/244 = 24.6 chips from cell B
Path difference = 41.0 – 26.4 = 16.4 chips
The SRCH_WIN_A > 2 × 16.4 > 32.8 chips
This way, as the mobile travels from cell A to cell B, the mobile can ensure that, beyond Y, the
pilot from cell A drops out of the search window.
10.4.2 SRCH_WIN_N
SRCH_WIN_N is the search window that the mobile uses to monitor the neighbor set
pilots. The size of this window is typically larger than that of SRCH_WIN_A. The window
needs to be large enough not only to capture all usable multipath of the serving base station’s
signal, but also to capture the potential multipath of neighbors’ signals. In this case, we need to
take into account multipath and path differences between the serving base station and neighbor-
Handoff Parameters 187
Cell A Cell B
Soft Handoff Region
X Y
6 km
10 km
16 km
ing base stations. The maximum size of this search window is limited by the distance between
two neighboring base stations. Let’s consider two neighboring base stations located at a distance
of 6 km. The mobile is located right next to base station 1, and, therefore, the propagation delay
from base station 1 to the mobile is negligible. The distance between base station 2 and mobile is
6 km. The distance in chips is 6000/244 = 24.6 chips. The search window shows that the pilot
from cell 2 arrives 24.6 chips later at the mobile. Thus, in order for a mobile (located within cells
1 and 2) to search pilots of potential neighbors, SRCH_WIN_N needs to be set according to the
physical distances between the current base station and its neighboring base station. The actual
size may not be this large, since this is an upper bound for SRCH_WIN_N.
10.4.3 SRCH_WIN_R
SRCH_WIN_R is the search window that the mobile uses to track the remaining set pilots.
A typical requirement for the size of this window is that it is at least as large as SRCH_WIN_N.
Base station
Pilot sends HDM Mobile sends Mobile sends
Strength HCM Base station HCM
sends HDM
Mobile sends Mobile
PSMM Mobile sends receives
PSMM NLUM
T_ADD
T_DROP
Active
Candidate
Neighbor
Neighbor
5. Handoff drop timer expires. Mobile sends a PSMM to the base station.
6. Base station sends an HDM without related pilot to the mobile.
7. Mobile receives HDM. Pilot goes into the neighbor set and mobile sends HCM to the
base station.
8. The mobile receives an NLUM which does not include the pilot. Pilot goes into the
remaining set.
The mobile maintains a T_TDROP for each pilot in the active set and candidate set. The
mobile starts the timer whenever the strength of the corresponding pilot becomes less than a pre-
set threshold. The mobile resets and disables the timer if the strength of the corresponding pilot
exceeds the threshold.
When a member of the neighbor or remaining set exceeds T_ADD, the mobile moves the
pilot to candidate set (Fig. 10-6) and sends a PSMM to the base station. As the signal strength of
candidate pilot Pc gradually increases, it rises above the active set pilot, Pa. A PSMM is sent to
the base station only if
Pc – Pa > T_COMP x 0.5 dB
where Pa and Pc are the strength of pilots in active and candidate sets.
Pilot Strength
T_COMP × 0.5 dB
Pa
T_ADD
1 2
Figure 10-6 Pilot Movement from Neighbor or Remaining Set to Active Set
Handoff Procedures 191
ent demodulation, and second to report those FPICHs whose power has dropped to a level where
it is not beneficial to use them for coherent demodulation. The margin between the two thresholds
provides a hysteresis to avoid a ping-pong effect due to variations in FPICH power. Based on this
information, the network instructs the mobile to add or remove FPICHs from its active set.
The same user information, modulated by the appropriate base station code, is sent from
multiple base stations. Coherent combining of different signals from different sectorized anten-
nas, from different base stations, or from the same antennas but on different multiple path compo-
nents is performed in the mobile using RAKE receivers. A mobile will typically place at least one
RAKE receiver finger on the signal from each base station in the active set. If the signal from the
base station is temporarily weak, then the mobile can assign the finger to a stronger base station.
The signal transmitted by a mobile is processed by base stations with which the mobile is
in soft handoff. The received signal from different sectors of a base station is combined in the
base station on a symbol-by-symbol basis. The received signal from different base stations can
be selected in the infrastructure (on a frame-by-frame basis). Soft handoff results in increased
coverage range and capacity on the reverse link.
When FPICHs in the active set are weak, adding an additional FPICH (even weak) will
improve performance. However, when there is one or more dominant FPICHs, adding an addi-
tional weaker FPICH above T 1 will not improve performance, but will use more network
resources. The dynamic soft-handoff thresholds reduce and optimize the network resource utili-
zation.
• After detecting an FPICH above T2, the mobile reports it back to the network. The net-
work then sets up the handoff resources and orders the mobile to coherently demodu-
late this additional FPICH. Pilot 2 is added to active set.
• When the FPICH (pilot 1) strength decreases below a dynamic threshold T3, the hand-
off connection is removed. The FPICH is moved back to the candidate set. The thresh-
old T 3 is a function of the total energy of FPICHs in the active set. FPICHs not
contributing sufficiently to total FPICH energy are dropped. If it decreases below a
static threshold T4, an FPICH is removed from the candidate set.
• An FPICH dropping below a threshold (e.g., T3 and T4) is reported back to the network
only after being below the threshold for a specific period of time. This timer allows for
a fluctuating FPICH not to be prematurely reported.
Fig. 10-7 shows a time representation of soft handoff and associated events when the
mobile station moves away from a serving base station (FPICH 1) toward a new base station
(FPICH 2). The combination of static and dynamic thresholds (vs. static thresholds only) results
in reduced soft-handoff regions (see Fig. 10-7). The major benefit of this is to limit soft handoff
to areas and times when it is most beneficial.
1. When pilot 2 exceeds T1, mobile moves it to the candidate set.
2. When pilot 2 exceeds T2 (dynamic), mobile reports it back to the network.
3. Mobile receives an order to add pilot 2 to the active set.
4. Pilot 1 drops below T3 (relative pilot 2).
5. Handoff timer expires on pilot 1. Mobile reports pilot strength to the network.
6. Mobile receives an order to remove pilot 1.
7. Handoff timer expires after pilot 1 drops below T4.
Ec /It
T1
T4
Fig. 10-8 shows a mobile communicating with two base stations for one call. This is called
a two-way soft handoff. Steps of soft handoff are
• The mobile detects a pilot signal from a new cell and informs primary base station A.
• A communications path from base station B to the original frame selector is established.
• The frame selector selects frames from both streams.
• The mobile detects that base station A’s pilot is failing and requests that this path be
dropped.
• The path from original base station A to the frame selector is dropped.
Base station B gives base station A its assigned Walsh code. Base station A gives the
mobile the Walsh code of B as part of the HDM. Now the mobile can listen to base station B.
Base station A gives the user’s long-code mask to base station B. Now B can listen to the
mobile. Both base stations A and B receive forward link power control information back from
the mobile and act accordingly. The mobile receives independent puncture bits from both A and
B. If directions conflict, the mobile decreases power; otherwise the mobile obeys directions.
Handoff Request
Frame Selector Join
ACK
ACK
Handoff Direction
ACK
Handoff Information
ACK
Pilot Measurement Request
PSMM
HDM (Drop A)
HCM
Master Transfer
ACK
ACK
New Primary BS
Handoff Information
ACK
PSMM
ACK
entered into soft handoff with base stations A and B, the primary base station was A. However,
when the mobile drops A and starts communicating with base station B alone, B becomes the
new primary base station.
moves from the remaining set to the neighbor set, its counter is set to the maximum age value
(see Fig. 10-12). The mobile adds a pilot in the neighbor set under the following conditions:
• A pilot in the active set is not contained in the HDM, and the corresponding handoff
drop timer has expired.
• The handoff drop timer of a pilot in the candidate set has expired.
• A new pilot to the candidate set causes the candidate set size limit to be exceeded.
• The pilot is contained in the Neighbor List message and is not already a pilot of the
candidate set or neighbor set.
The mobile deletes a pilot in the neighbor set under the following conditions:
• The HDM contains a pilot from the current neighbor set.
• The strength of a pilot in the neighbor set exceeds T_ADD.
• A new pilot to the neighbor set causes the size limit of the neighbor set to be exceeded.
• A neighbor set pilot’s AGE exceeds the maximum value of the AGE counter.
AGE = 0
Active Set
Neighbor Set
Set Size Exceeded
or
AGE > AGE_MAX
Remaining Set
Power control is also needed in CDMA systems to resolve the near-far problem. To mini-
mize the near-far problem, the goal in a CDMA system is to assure that all mobiles achieve the
same received power levels at the base station. The target value for the received power level must
be the minimum level possible that allows the link to meet user-defined performance objectives
(BER, FER, capacity, dropped-call rate, and coverage). In order to implement such a strategy,
the mobiles closer to the base station must transmit less power than those far away.
Voice quality is related to frame-error rate (FER) on both the forward and reverse link. The
FERs are largely correlated to Eb /It . The FER also depends on vehicle speed, local propagation
conditions, and distribution of other cochannel mobiles. Since the FER is a direct measure of
signal quality, the voice quality performance in a CDMA system is measured in terms of FERs
rather than Eb /It . Thus, to assure good signal quality, it is not sufficient to maintain a target Eb /It ;
198 Ch. 10 • Soft Handoff and Power Control in IS-95 CDMA
it is also necessary to respond to specific FERs as they occur. The recommended performance
bounds are
• A typical recommended range for FER—0.2% to 3% (optimum power level is achieved
when FER ≤ 1%)
• A maximum length of burst error—3 to 4 frames (optimum value of burst error ≈ 2
frames)
power control bits). Since the reverse link closed-loop power control is not active, the mobile
initiates, on its own, any power adjustment required for a suitable operation.
The prime goal in CDMA systems is to transmit just enough power to meet the required
performance objectives. If more power is transmitted than necessary, the mobile becomes a jam-
mer to other mobiles. Therefore, the mobile tries to get the base station attention first by trans-
mitting at very low power. The key rule is that the mobile transmits in inverse proportion to what
it receives.
When receiving a strong pilot from the base station, the mobile transmits a weak signal
back to the base station. A strong signal at the mobile implies a small propagation loss on the
forward link. Assuming the same path loss on the reverse link, only a low transmit power is
required from the mobile in order to compensate for the path loss.
When receiving a weak pilot from the base station, the mobile transmits back a strong sig-
nal. A weak received signal at the mobile indicates a high propagation loss on the forward link.
Conversely, a high transmit power level is required from the mobile.
The mobile transmits the first access probe at a mean power level defined by
The major flaw with this criterion is that reverse link propagation statistics are estimated
based on forward link propagation statistics. But, since the two links are not correlated, a signif-
icant error may result from this procedure. However, these errors will be corrected once the
closed-loop power control mechanism becomes active as the mobile seizes a forward traffic
channel and begins to process power control bits.
After the Acknowledgment time window (Ta ) has expired, the mobile waits for an addi-
tional random time (RT) and increases its transmit power by a step size. The mobile tries again.
The process is repeated until the mobile gets a response from the base station. However, there is
a maximum number of probes per probe sequence and a maximum number of probe sequences
per access attempt.
The entire process to send one message and receive an acknowledgment for the message is
called an access attempt. Each transmission in the access attempt is referred to as an access
probe. The mobile transmits the same message in each access probe in an access attempt. Each
access probe contains an access channel preamble and an access channel capsule (see Fig. 10-
13). Within an access attempt, access probes are grouped into access probe sequences. Each
access probe sequence consists of up to 16 access probes, all transmitted on the same access
channel.
There are two reasons that could prevent the mobile from getting an acknowledgment after
the transmission of a probe.
1 2 15 (Max.)
Back-off
Delay
Probe # 1 Probe # 3
Probe # 2
1. The transmit power level might be insufficient. In this case, the incremental step power
strategy helps to resolve the problem.
2. There might be a collision due to the random contention of the access channel by sev-
eral mobiles. In this case, the random waiting time minimizes the probability of future
collisions.
The process is shown by the access probe ladder in Fig. 10-14.
The transmit power is defined by
T x = – R x – K + ( NOM-PWR – 16 × NOM-PWR-EXT )
+ Sum of Access Probe Corrections (10.3)
where the access probe correction is the sum of all the appropriate incremental power steps prior
to receiving an acknowledgment at the mobile.
For every access probe sequence, a back-off delay is generated pseudorandomly. Timing
between access probes of an access probe sequence is also generated pseudorandomly. After
transmitting each access probe, the mobile waits for Ta . If an acknowledgment is received, the
access attempt ends. If no acknowledgment is received, the next access probe is transmitted after
an additional random time (see Fig. 10-13).
If the mobile does not receive an acknowledgment within an access attempt, the attempt is
considered as a failure and the mobile tries to access the system at another time. If the mobile
receives an acknowledgment from the base station, it proceeds with the registration and traffic
channel assignment procedures. The initial transmission on the reverse traffic channel shall be at
a mean output power defined by Eq. (10.3).
The mobile station supports a total combined range of initial offset parameters, closed
NOM-PWR, and access probe corrections of at least ±32dB for mobile stations operating in
Band Class 0 and ±40dB for mobile stations operating in Band Class 1.
Tx
Initial Power
+ Open-Loop
Correction
Access Probe
Figure 10-14 Access Probe Ladder
202 Ch. 10 • Soft Handoff and Power Control in IS-95 CDMA
Gated-on PCGs
Gated-off PCGs 1 PCG = 1.25 ms PCG = power control group
others. The duty cycle of the transmission gate varies with the transmit data rate, i.e., variable
rate vocoder output, which, in turn, depends on the voice activity. Table 10-2 indicates the num-
ber of PCGs that are sent at different frame rates.
The assignment of the gated-on and gated-off groups is determined by the Data Burst Ran-
domizer (DBR). At the base station, the reverse link receiver estimates the received signal
strength by measuring Eb /It during each power group (1.25 ms).
• If the signal strength exceeds a target value, a power-down power control bit 1 is sent.
• Otherwise a power-up control bit 0 is transmitted to the mobile via the power control
subchannel on the forward link.
Similar to the reverse link transmission, the forward link transmissions are organized in
20-ms frames. Each frame is subdivided into 16 PCGs. The transmission of a power control bit
occurs on the forward traffic channel in the second PCG following the corresponding reverse
link PCG in which the signal strength was estimated. For example, if the signal strength is esti-
mated on PCG #2 of a reverse link frame, then the corresponding power control bit must be sent
on PCG #4 of the forward link frame (see Fig. 10-16). Once the mobile receives and processes
the forward link channel, it extracts the power control bits from the forward traffic channel. The
power control bits then allow the mobile to fine-tune its transmit power on the reverse link.
Based on the power control bit received from the base station, the mobile either increases
or decreases transmit power on the reverse traffic channel as needed to approach the target value
of (Eb /It )nom or set point that controls the long-term FER. Each power bit produces a 1-dB change
in mobile power, i.e., it attempts to bring the measured Eb /It value 1 dB closer to its target value.
Note that it might not succeed because It is also always changing. Therefore, further adjustments
may be required to achieve the desired Eb /It . The base station, through the mobile, can directly
change only Eb, not It , and the objective is the ratio of Eb to It , not any particular value for Eb or It.
The base station measures Eb /It 16 times in each 20-ms frame. If the measured Eb /It is
greater than the current target value of Eb /It , the base station informs the mobile to decrease its
power by 1 dB. Otherwise, the base station orders the mobile to increase its power by 1 dB (see
Fig. 10-17).
The relationship between Eb /It and the corresponding FER is nonlinear and varies with
vehicle speed and RF environment. Performance deteriorates with increasing vehicle speed. The
best performance corresponds to a stationary vehicle where additive white Gaussian noise domi-
nates. Thus, a single value of Eb /It is not satisfactory for all conditions. The use of a single, fixed
value for Eb /I t could reduce channel capacity by 30% or more by transmitting excessive,
unneeded power.
The value of the variable a is kept very small (see Fig. 10-18), so it may take 35 frames to
reduce the Eb /It set point by 1 dB. Typically, the value of 100a is set at about 3 dB. The set point
value is reduced by a for each consecutive frame until a frame error occurs. The set point is then
increased by a relatively large amount and the process is repeated. The set point can range from
3 dB to 10 dB. A value of Eb /It ≥ 5 dB corresponds to good voice quality.
Since FER is a direct measure of link quality, the system is controlled using the measured
FERs rather than Eb /It . FER is the key parameter in controlling and assuring a satisfactory voice
quality. It is not sufficient to maintain a target Eb /It , but it is necessary to control FERs as they
occur. The objective of the Reverse Outer-Loop Power Control (ROLPC) is to balance the
desired FER on the reverse link and system capacity. System capacity can be controlled with the
Eb Eb
Mobile
Transmit
Power
(dBm) 1.25 ms
Next
Eb /It
Target Set Point
Eb /It
It
Maximum
10 dB
100a
100a
Frame Error
20 ms Occurs
Minimum
3 dB
Time
Figure 10-18 Set Point Value vs. Time
ROLPC parameters by increasing the acceptable FER. Changing FER can be accomplished by
setting the ratio of down_ frr to up_ frr. The down_ frr is calculated by the system by using the
desired reverse FER (rfer) and up_ frr as
down_ frr = (rfer × up_ frr)/2 (10.4)
Based on simulations, the following values for up_ frr are suggested:
If (0.2% ≤ rfer ≤ 0.4%), up_ frr = 6000
If (0.6% ≤ rfer ≤ 1.0%), up_ frr = 5000
If (1.2% ≤ rfer ≤ 2.0%), up_ frr = 3000
If (2.2% ≤ rfer ≤ 3.0%), up_ frr = 1000
Tables 10-3 and 10-4 lists the range and default values of different parameters for RS1 and
RS2.
The inner-loop power control is also responsible for detecting the mobile that fails to
respond to power control and that may be causing interference to other mobiles. The base station
counts the number of consecutive power decrease commands, and, if the count exceeds the spec-
ified threshold value, the base station will send a Lock until Power Cycle message to the mobile.
This message disables the mobile until the user turns the power off and on. Fig. 10-19 gives the
flow chart for the reverse link closed-loop power control.
206 Ch. 10 • Soft Handoff and Power Control in IS-95 CDMA
The mobile power output with both open-loop and closed-loop power control is given as
Initialize Eb /It
Set Point to (Eb /It)nom
Measure Eb /It on
PCG (1.25 ms)
Yes No
(Eb /It)m > set point
Order mobile to
power up 1 dB.
Order mobile to
power down 1 dB.
No No One Frame
No. of Commands Received
> Threshold
Yes
Yes
Figure 10-19 Flow Chart for Reverse Link Closed-Loop Power Control
Measure ffer
(ffer)m
No No
(ffer)m< (ffer)T Timer Has
Expired
Yes
Yes
Report Measurement
Repeat Process
Forward link power control is expressed in terms of parameters N, D, U, and V (see Fig.
10-21), which may be adjusted to various values for the operation of an actual system.
For RS1, the Power Measurement Report message (PMRM) contains the number of error
frames received and the total number of frames received during the interval covered by the
report (frame counters then are reset for the next report interval). The FER is equal to the num-
ber of error frames divided by the total number of frames received in the reporting interval. The
following are the steps for forward link power control for RS1 (see Fig. 10-21).
Action by Mobile
• Mobile keeps track of the number of error frames in a period of length pwr_rep_ frame.
• If error frames > a specified number, the mobile sends a PMRM containing:
◆ Total number of frames in pwr_rep_ frame
◆ Number of error frames in pwr_rep_ frame
◆ FER
• If error frames < a specified number, a PMRM is not sent.
• After sending a PMRM, the mobile waits for a period—pwr_rep_delay—before start-
ing a new period.
Action by Base Station
• On receiving the PMRM, the base station compares the reported FER as follows and
adjusts traffic channel power.
◆ FER < fer_small → reduce power by D
◆ fer_small < FER < fer_big → increase power by U
◆ FER > fer_big → increase power by V
N Frames
Time
Figure 10-21 Forward Link Power Control for RS1
Forward Link Power Control 209
• If no PMRM is received
◆ Base station starts a timer fpc_step.
◆ When timer expires, power level is reduced by D.
◆ The timer resets after it expires or after receipt of a PMRM.
• Digital gain is never set below min_gain or above max_gain.
• If flpc_enable = 0, digital gain is set to nom_gain.
For RS2, 1 bit per reverse link frame (the E or erasure bit) is dedicated to inform the base
station whether or not the last forward link frame was received without error at the mobile. This
allows more rapid and precise control of forward link power than the scheme used for RS1. The
following are the steps for forward link power control for RS2 (see Fig. 10-22).
Forward Link Power Control with RS2
• Uses erasure indicator bit instead of PMRM
• Much faster than RS1 implementation
◆ Forward link power control could change every 2 frames; thus, its response is
very fast.
• Process
◆ In each frame, the mobile sends an erasure indicator bit showing whether the pre-
vious forward frame had an erasure bit or not.
◆ If an erasure is indicated by the mobile, the base station increases traffic channel
digital gain by dn_adj.
Tables 10-5 and 10-6 list the values of the parameters for forward link power control for
RS1 and RS2, respectively.
down_adj
up_adj
Time
Figure 10-22 Forward Link Power Control for RS2
210 Ch. 10 • Soft Handoff and Power Control in IS-95 CDMA
10.13 Summary
This chapter covered soft handoff and power control in IS-95 CDMA. Soft handoff provides
path diversity on the forward and reverse links. Diversity gains are achieved because less power
is required on the forward and reverse links. This results in the reduction of total system interfer-
ence and an increase in system capacity.
Since the RF environment changes continuously due to fast and slow fading, shadowing,
external interference, and other factors, the aim of power control is to adjust the transmitted
power on the forward and reverse link while maintaining link quality under all operating condi-
tions. Power control in the CDMA system is required to resolve the near-far problem. To mini-
mize the near-far problem, the goal in a CDMA system is to assure that all mobile stations
achieve the same received power levels at the base station.
References 211
The reverse link power control includes the open-loop power control and the closed-loop
power control. The open-loop power control is too slow to counter fast fading due to multipath.
The closed-loop power control provides correction to the open-loop power control. It begins
after acquiring the traffic channel and is directed by the base station. The closed-loop power con-
trol occurs every 1.25 ms and is much faster and more effective than the open-loop power con-
trol. With the closed-loop power control, power can change ±16 dB per 20-ms frame.
10.14 References
1. Garg, V. K., Smolik, K. F., and Wilkes, J. E., Application of CDMA in Wireless/Personal
Communications, Prentice Hall PTR, Upper Saddle River, NJ, 1997.
2. TIA/EIA IS-95A, “Mobile Station–Base Station Compatibility Standard for Dual-Mode
Wideband Spread Spectrum Cellular Systems,” May 1995.
3. TIA/EIASP-3693, “Mobile Station–Base Station Compatibility Standard for Dual-Mode
Wideband Spread Spectrum Cellular Systems,” November 18, 1997.
4. Wang, S. W., and Wang, I., “Effects of Soft Handoff, Frequency Reuse and Non-Ideal
Antenna Sectorization on CDMA System Capacity,” Proc. IEEE VTC, Secaucus, NJ, May
1993, pp. 850–54.
5. Wong, Daniel, and Lim, T. J., “Soft Handoff in CDMA Mobile Systems,” IEEE Personal
Communications, 4(6), December 1997.
This page intentionally left blank
C H A P T E R 1 1
Security and
Identification in IS-95
CDMA
11.1 Introduction
This chapter looks at various parameters that are used to identify a mobile station, including
International Mobile Station Identity (IMSI), Mobile Directory Number (MDN), Electronic
Serial Number (ESN), and station class mark. Then the focus shifts to authentication proce-
dures—the authentication of MS registration, of MS originations, of MS terminations, of MS
data bursts, and of Temporary Mobile Station Identity (TMSI) assignment—and unique chal-
lenge response procedures. This chapter also covers the procedure to update Shared Secret Data
(SSD) as well as the parameter update and voice privacy procedures.
213
214 Ch. 11 • Security and Identification in IS-95 CDMA
An IMSI_S is a 10-digit (34-bit) number derived from an IMSI. When an IMSI has 10 or
more digits, IMSI_S is equal to the last 10 digits. When an IMSI has fewer than 10 digits, the
least significant digits of IMSI_S are equal to the IMSI and 0s are added to the most significant
side to obtain a total of 10 digits. A 10-digit IMSI_S consists of 3- and 7-digit parts, called
IMSI_S2 and IMSI_S1, respectively, as shown in Fig. 11-2.
The IMSI_S derived from IMSI_M is designated IMSI_M S. The IMSI_S derived from
IMSI_T is designated IMSI_T S. The IMSI_S derived from IMSI_O is designated IMSI_O S.
When an IMSI has 12 or more digits, IMSI_11 12 is equal to the 11th and 12th digits of the
IMSI. When an IMSI has fewer than 12 digits, digits with value equal to 0 are added to the
most significant side to obtain a total of 12 digits and the IMSI_11 12 is equal to the 11th and
12th digits of the resulting number. For encoding various types of IMSI, refer to the IS-95B
standards [5].
IMSI_S2 IMSI_S1
IMSI_S Digits First 3 Digits Second 3 digits Thousand digits Last 3 digits
Bits 10 10 4 10
Figure 11-2 IMSI_S Binary Mapping
Mobile Identification Parameters 215
SSD_A SSD_B
64 bits 64 bits
Figure 11-3 Partitioning of SSD
the RAND value received in the last Access Parameters message of the CDMA paging
channel. RAND is used along with SSD_A and other parameters, as appropriate, to
authenticate MS originations, terminations, and registrations.
• Call History Parameter (COUNT). COUNT is a modulo-64 count held in the MS and
is updated by the MS when a Parameter Update order is received on the CDMA for-
ward traffic channel.
• A-Key. A-key is 64 bits long and is assigned to the mobile station (Fig. 11-4). It is
stored in the mobile station’s permanent security identification memory and is known
only to the mobile station and its associated HLR/AC.
• Temporary Mobile Station Identity (TMSI). TMSI is a temporary, locally assigned
number used to address the MS. The MS obtains a TMSI when assigned by the BS. As
a number, the TMSI does not have any association with the MS, IMSI, ESN, or direc-
tory numbers, all of which are permanent identifications.
A-Key
64 bits
AUTH_SIGNATURE
Procedure
AUTH_SIGNATURE
AUTHR (18)
AUTH_SIGNATURE
Procedure
AUTH_SIGNATURE
AUTHU (18)
*8 least significant bits of IMSI_S2
AUTHU to the value received from the MS. If the comparison fails, the BS may deny further
access attempts by the MS, drop the call in process, or initiate the process of updating SSD.
AUTH_SIGNATURE
Procedure
AUTH_SIGNATURE
AUTHR (18)
*Last 6 digits transmitted by the MS
(8 most significant bits of RAND) and COUNT fields of the message are filled with the current
value stored in the MS. The BS compares the received value of the RANDC to the most signifi-
cant 8 bits of the internally stored value of the RAND. The BS may also compare the received
value of COUNT with its internally stored value associated with the received IMSI/ESN. The
BS computes the value of AUTHR in the same manner as the MS, but uses its internally stored
value of SSD_A. The BS compares its computed value of AUTHR to the value received from the
MS. If the comparisons executed at the BS are successful, the BS may initiate the appropriate
channel assignment procedures. After channel assignment, the BS may issue a Parameter Update
order on the forward traffic channel, updating the value of COUNT in the MS. If any of the com-
parisons fail, the BS may deny service, initiate the unique challenge procedure, or commence
the process of updating the SSD.
AUTH_SIGNATURE
Procedure
AUTH_SIGNATURE
AUTHR (18)
AUTH_SIGNATURE
Procedure
AUTH_SIGNATURE
AUTHR (18)
*Digits from the requesting procedure
as the MS, but uses its internally stored value of SSD_A. The BS compares its computed value
of AUTHR to the value received from the MS.
If any of the comparisons fail, the BS may deem the TMSI assignment unsuccessful, ini-
tiate the unique challenge response procedure, or commence the process of SSD update.
MS BS MSC
SSD Update Request
SSD Update Order
Base Station
Challenge Response
Base Station Challenge
Confirmation Order
SSD_Generation
Procedure
SSD_A_NEW SSD_B_NEW
64 64
Computation of AUTHBS
AUTH_SIGNATURE
Process
AUTHBS
18
9. Upon receipt of the Base Station Challenge Confirmation Order message, the MS com-
pares the received value of AUTHBS to its internally computed value.
10. If the MS receives a Base Station Challenge Confirmation Order message when an SSD
update is not in progress, the MS responds with an SSD Update Rejection order.
11. If the comparison is successful, the MS executes the SSD_update procedure to set
SSD_A and SSD_B to SSD_A_NEW and SSD_B_NEW, respectively. The MS then
sends an SSD Update Confirmation Order message to the BS, indicating a successful
completion of the SSD update.
12. If the comparison is not successful, the MS discards SSD_A_NEW and SSD_B_NEW
and then sends an SSD Update Rejection Order message to the BS indicating unsuc-
cessful completion of the SSD update.
13. Upon receipt of the SSD Update Confirmation Order message, the BS sets SSD_A and
SSD_B to the value received from the HLR/AC.
14. If the MS fails to receive the Base Station Challenge Confirmation Order message
within T64m seconds of the reception of the acknowledgment to the Base Station Chal-
lenge Order message, the MS discards SSD_A_NEW and SSD_B_NEW. The mobile
then terminates the SSD update process.
Message flow for an SSD update is shown in Fig. 11-12.
SSD_GENERATION_PROCEDURE SSD_GENERATION_PROCEDURE
SSD_B_NEW SSD_A_NEW
SSD_A_NEW SSD_A_NEW
AUTH_SIGNATURE AUTH_SIGNATURE
AUTHBS
MS BS MSC
Privacy Mode
Command
Mobile Order
Timer
Mobile Response T3280
Privacy Mode
Complete
1. At any point during the call following the receipt of the Assignment Complete message
the MSC may send the Privacy Mode Command message to the BS to specify that pri-
vacy is to be provided for traffic information. The MSC then starts timer T3280.
2. After the radio traffic channel has been acquired, voice privacy can be established when
the BS transmits a voice privacy request order to the MS.
3. The MS performs the required privacy mode procedures and acknowledges the BS with
a voice privacy response order.
4. The BS returns the Privacy Mode Complete message to the MSC to indicate successful
receipt of the Privacy Mode Command message. The MSC stops timer T3280 upon
receipt of the Privacy Mode Complete message.
The Privacy Mode Command Optional BSMAP message may be sent by the MSC to the
BS after receipt of the Assignment Complete message. Its typical application is to specify the
use of encryption/privacy parameters for the call. It may be sent in the following cases:
• To preload the BS with encryption/privacy parameters during call setup
• To enable or disable the use of encryption/privacy during conversation
The preloading of the BS with parameters allows the BS to immediately initiate privacy upon
request by the mobile user or immediately following assignment to a traffic channel.
Where the MSC needs to provide encryption/privacy information to the BS during call
setup, it may place the information in the Privacy Mode Command message or place it in the
Assignment Request message. Which message is chosen for including encryption information is
a BS and MSC manufacturers’ choice.
The privacy mode procedures may be invoked by the MSC during the conversation state to
enable or disable the use of encryption/privacy. This may be initiated by the MSC or sent in
response to a request for privacy by mobile user.
11.7 Summary
This chapter introduced various parameters used to identify a mobile station. Because fraud is a
serious problem in the analog AMPS system, IS-95 CDMA uses cryptographic methods for
combating fraud. At any time during call processing, the MSC can present a unique challenge to
a mobile station to confirm its identity. We discussed the unique challenge response procedures
used by a mobile station.
The chapter described various types of authentication procedures in which information is
exchanged between an MS and a BS to confirm the identity of the MS. A successful authentica-
tion process occurs only when it is demonstrated that the MS and BS possess identical sets of
Shared Secret Data (SSD).
Also discussed was the procedure to update the SSD, including a call flow diagram. The
procedure involves exchange of the SSD update request, BS challenge, BS challenge response,
and SSD update response messages between the MSC and the BS. The chapter concluded with a
228 Ch. 11 • Security and Identification in IS-95 CDMA
presentation of procedures used when the MSC instructs the mobile station to update the call
history count (COUNT) and when voice privacy is requested between the BS and MS.
11.8 References
1. Garg, V. K., and Wilkes, J. E., Wireless and Personal Communications Systems, Prentice
Hall PTR, Upper Saddle River, NJ, 1996.
2. Report of the Joint Experts Meeting on Privacy and Authentication for PCS, Phoenix, Ari-
zona, November 8–12, 1993.
3. TIA Interim Standard, IS-41C, “Cellular Radio Telecommunications Intersystem Opera-
tions,” 1997.
4. TIA IS-95A, “Mobile Station–Base Station Compatibility Standard for Dual Mode Spread
Spectrum Cellular System,” 1992.
5. TIA IS-95B, “Mobile Station–Base Station Compatibility Standard for 800 MHz Cellular
Mobile Telecommunications System and 1.8 to 2.0 GHz CDMA PCS Systems,” 1998.
C H A P T E R 1 2
RF Engineering and
Network Planning
12.1 Introduction
This chapter presents basic guidelines for engineering a CDMA system. The topic is extremely
complex and cannot be covered extensively in a single chapter. This chapter discusses several
topics that are germaine to the engineering of a CDMA system: propagation models, link bud-
gets, the transition from analog operation to CDMA operation, radio link capacity, facility engi-
neering, border cells on a boundary between two service providers, and interfrequency handoff.
229
230 Ch. 12 • RF Engineering and Network Planning
between the desired quality and overall network cost. A smaller signal outage probability means
smaller cells and therefore higher overall network cost; smaller interference outage probability
implies lower capacity and thus higher network cost. An outage probability of 5 to 10% corre-
sponding to 90 to 95% coverage probability is often used. The coverage probability could be
different for different services.
Many factors must be included in radio network planning. The network planning should
address issues such as traffic distribution, macro- and micro-cell deployment, provision for
indoor and high-bit-rate coverage, cell locations and cost of sites, and environmental concerns
such as cell tower appearance.
Soft-handoff gain has a large impact on link budget. The soft-handoff gain depends on
shadowing correlation and coverage probability. Soft handoff provides macroscopic diversity
gain through increased diversity.The actual gain depends on the radio environment and number
of RAKE receiver fingers. Since each radio environment has its own characteristics, for the
detailed coverage prediction, some correction factors for the path-loss models are needed.
For the reverse link, the impact of load factor ρ in the link budget for interference margin
Im (dB) can be determined from
I m = 10 log ------------
1
(12.1)
1 – ρ
Since the interference margin increases with ρ, cell range would decrease with the increas-
ing load factor. Asymmetric traffic load should be taken into consideration in link budget calcu-
lations. CDMA can trade the reverse link capacity for coverage. This is useful since usually the
mobile transmission power limits the maximum cell range.
After the cell count has been obtained, detailed radio network planning can be initiated by
taking into account the exact radio environment where each cell will be located. Due to cost of
sites, zoning requirements, building restrictions, or other reasons, it may not be possible to
achieve optimum cell sites in a real network. This may impact the initial coverage plan. For
detailed network planning, a network planning tool should be used. A network planning tool has
a digital map of the area to be planned. Building heights and antenna pattern are also modeled.
The optimization process of radio network coverage generally includes
• Detailed description of radio environment
• Control channel power planning
• Soft-handoff parameters planning
• Interfrequency handoff planning
• Iterative network coverage analysis
• Network testing
be used either directly in the planning process to access the feasibility of individual cell sites or
to calibrate the coefficients of the empirical propagation model to achieve better characterization
of a specific environment.
Radio propagation in an urban environment is subject to shadowing. To ensure that the sig-
nal level in 90% of the cell area is equal to or above the specified threshold, a shadow fading
margin, which is dependent on the standard deviation of the signal level, must be included in the
link budget. For a typical urban environment, a shadow fading margin of 8 to 9 dB should be
used based on the assumption that the path loss follows an inverse 2–5 exponent law—the path
loss is inversely proportional to the distance of separation raised to a power between 2 and 5.
The value of the power is dependent upon propagation characteristics.
Another critical factor that affects radio coverage is the penetration loss for both buildings
and vehicles. If radio coverage for the outer portion of a building is sufficient, then an assumed
penetration loss of 10 to 15 dB should be adequate. However, if calls will be received and origi-
nated within the inner core of the building, a penetration loss of about 30 dB should be used.
Similarly, for in-vehicle coverage, the penetration loss is equally important. A car could experi-
ence a penetration loss of 3 to 6 dB, whereas vans and buses have even larger variations. The
penetration loss at the front of a van should be no more than that experienced in a car, but the
loss at the back of a van could be as high as 10 to 12 dB, depending on the amount of window
space. Thus, the designer should assume a high penetration loss to ensure good service quality.
For an urban environment, because building penetration loss is the dominant factor in designing
the system, in-vehicle penetration will generally be sufficient as a consequence.
model can account for all perturbations experienced in the real world, it is essential to use one or
several models for determining the path losses in the network. Each of the propagation models
being used in the industry has pros and cons. It is through a better understanding of the limita-
tions of each of the models that a good RF engineering design can be achieved in a network.
r
P ( r ) = N ( r 0, σ ) + 10γ log ---- dB (12.2)
r0
where P(r) = loss at distance r relative to the loss at a reference distance r0,
γ = path-loss exponent, and
σ = standard deviation, typically 8 dB.
The second term on the right side of Eq. (12.2) represents a constant attenuation in the outside
environment between the base station and the mobile station. Typically, γ approximately
equals 4, although it may range between 2 (which equals the loss in free space) and 5. If γ is
equal to 4, then the signal will be attenuated 40 dB if the distance increases ten times with
respect to the reference distance. The first term in Eq. (12.2) represents the variation in the loss
about the average path loss. This function is an approximate log-normal distribution with an
average equal to the second term and a standard deviation of approximately 8 dB. It has been
found that this value is applicable for a wide range of radio environments, including urban and
rural areas.
L 50 = 69.55 + 26.16 log f c – 13.82 log h b – a ( h m ) + ( 44.9 – 6.55 log h b ) log r dB (12.3)
234 Ch. 12 • RF Engineering and Network Planning
or
2
a ( h m ) = 3.2 ( log 11.75h m ) – 4.97 dB, fc ≥ 400 MHz (12.6)
Suburban area:
fc 2
L 50 = L 50 ( urban ) – 2 log ------ – 5.4 dB (12.7)
28
Open area:
2
L 50 = L 50 ( urban ) – 4.78 ( log f c ) + 18.33 log f c – 40.94 dB (12.8)
Hata’s model does not account for any of the path-specific correction used in Okumura’s
model.
Okumura’s model [6] tends to average some of the extreme situations and does not
respond sufficiently quickly to rapid changes in the radio path profile. The distance-dependent
behavior of Okumura’s model is in agreement with the measured values. Okumura’s measure-
ments are valid only for the building types found in Tokyo. Experience with comparable mea-
surements in the United States has shown that the typical U.S. suburban situation is often
somewhere between Okumura’s suburban and open areas. Okumura’s suburban definition is
more representative of a U.S. residential metropolitan area with large groups of row houses.
Propagation Models 235
L 50 = L f + L rts + L ms (12.9)
or
L 0 = – 9.646 dB 0 ≤ φ ≤ 35 degrees
L 0 = 4 – 0.114 ( φ – 55 ) dB 55 ≤ φ ≤ 90 degrees
R
∆hb θ
hb ∆hm
hR hm
Building Building
Mobile
φ
Building Building
1 ≤ hm ≤ 3 (m)
0.02 ≤ r ≤ 5 (km)
The following default values can be used for the model:
b = 20–50 (m)
W = b/2
φ = 90 degrees
Roof = 3 m for pitched roof and 0 m for flat roof
hr = 3 (number of floors) + roof
Table 12-1 uses the following data to show a comparison of the path loss from the Hata
and Walfisch-Ikegami models.
fc = 880 MHz; hm = 1.5 m; hb = 30 m; roof = 0 m; hr = 30 m; φ = 90 degrees; b = 30 m; and
W = 15 m.
The path losses predicted by Hata’s model are about 13 to 16 dB lower (see Fig. 12-2) than
those predicted by the Walfisch-Ikegami model. Hata’s model ignores effects from street width,
street diffraction, and scatter losses, which the Walfisch-Ikegami model includes.
• Correction Factor for Attentuation Due to Trees. Weissberger [15] has developed a
modified exponential delay model that can be used where a radio path is blocked by
dense, dry, in-leaf trees found in temperate climates. The additional path loss can be
calculated from the following expression:
0.284 0.588
L t = 1.33 ( f c ) (d f ) dB, for 14 ≤ d f ≤ 400 m (12.14)
0.284
= 0.45 ( f c ) d f dB, for 0 ≤ d f ≤ 14 m (12.15)
where Lt = loss in dB,
fc = frequency in GHz, and
df = tree height in meters.
Table 12-1 A Comparison of Path Loss from Hata and Walfisch-Ikegami Models
Path Loss (dB)
Distance (km) Hata’s Model Walfisch-Ikegami Model
1 126.16 139.45
2 136.77 150.89
3 142.97 157.58
4 147.37 162.33
5 150.79 166.01
238 Ch. 12 • RF Engineering and Network Planning
180
Path Loss in dB
160
140
120
0 1 2 3 4 5 6
Distance from Transmitter (km)
Walfisch-Ikegami (COST231) Model
Hata Model
Figure 12-2 Comparison of Hata and Walfisch-Ikegami Models (Path Loss vs. Distance)
The difference in path loss for trees with and without leaves has been found to be about 3
to 5 dB. For a frequency of 900 MHz, the above equations are reduced to
0.588
L t = 1.291 ( d f ) dB, for 14 ≤ d f ≤ 400 m (12.16)
between floors. Measurements have indicated that loss between floors does not increase linearly
in dB with increasing separation distance. The greatest floor attenuation in dB occurs when the
receiver and transmitter are separated by a single floor. The overall path loss increases at a
smaller rate as the number of floors increases. Typical values of attenuation between floors is 15
dB for one floor of separation and an additional 6 to 10 dB per floor separation up to four floors
of separation. For five or more floors of separation, path loss will increase by only a few dB for
each additional floor (see Table 12-2).
The signal strength received inside a building due to an external transmitter is important
for wireless systems that share frequencies with neighboring buildings or with an outdoor sys-
tem. Experimental studies have shown that the signal strength received inside a building
increases with height [9]. At lower floors of a building, the urban cluster induces greater atten-
uation and reduces the level of penetration. At higher floors, an LOS path may exist, thus caus-
ing a stronger incident signal at the exterior wall of the building. RF penetration is found to be
a function of frequency as well as height within a building. Penetration loss decreases with
increasing frequency. Measurements made in front of a window showed 6 dB less penetration
loss on coverage than those measurements made in parts of the building without windows.
Experimental studies also showed that building penetration loss decreased at a rate of about 2
dB per floor from ground level up to the 10th floor and then began to increase around the 10th
floor. The increase in penetration loss at the higher floors was attributed to shadowing effects of
adjacent buildings.
The mean path loss is a function of distance to the γth power [7].
L 50 ( r ) = L ( r 0 ) + 10 × γ log ---- dB
r
(12.18)
r 0
L ( r ) = L 50 ( r ) + X σ dB (12.19)
Another path-loss prediction model suggested in [7] uses a Floor Attenuation Factor
(FAF). A constant floor attenuation factor (in dB), which is a function of the number of floors
and building type, was included in the mean path loss predicted by a path-loss model that uses
the same-floor path-loss exponent for the particular building type.
Table 12-3 provides the floor attentuation factors and the standard deviation (in dB) of the
difference between the measured and predicted path loss. Values for the floor attenuation factor
in Table 12-3 are an average (in dB) of the difference between the path loss observed at multi-
floor locations and the mean path loss predicted by the simple rγ model (Eq. [12.18]), where γ is
the same-floor exponent listed in Table 12-2 for the particular building structure and r is the
shortest distance, measured in three dimensions, between the transmitter and receiver.
EXAMPLE 12.1
Use the two models (Eqs. [12.20] and [12.21]) to predict the mean path loss at a distance r = 30 m
through three floors of an office building; assume the mean path-loss exponent for same-floor mea-
surements in the building is γ = 3.27, the mean path-loss exponent for three-floor measurements is γ
= 5.22, and the average FAF is 24.4 dB.
From Eq (12.20):
with a standard deviation of 10 dB for outdoors and 12 dB for indoors is reasonable. Average
building penetration loss of 18 dB with a standard deviation of 10 dB is appropriate. Rayleigh
and/or Rician fading rates are generally set by walking speeds, but faster fading due to reflec-
tions from moving vehicles may occur sometimes. The following path-loss model has been sug-
gested for use in this environment:
Initial Received
Transmitted 3
Pulse
Pulses
1
Base Station
Antenna
4
2 N: 4
N >> 4
t
τd
• Uniform
τ
D ( t ) = ----d- , 0 ≤ t ≤ 2τ d
2
D ( t ) = 0 , elsewhere
The measured data suggest that the mean delay spreads are different in different environ-
ments (refer to Table 12-4).
A majority of the time, the RMS delay spreads are relatively small, but, occasionally, there
are worst-case multipath characteristics that lead to much larger RMS delay spreads. Measure-
ments in outdoor environments show that RMS delay spread can vary over an order of magni-
tude within the same environment. Delay spreads can have a major impact on system
performance. To accurately evaluate the relative performance of radio transmission technolo-
gies, it is important to model the variability of delay spread as well as the worst-case locations
where delay spread is relatively large. Three multipath channels are defined by IMT-2000 for
each environment. Channel A represents the low-delay-spread case that occurs frequently; chan-
nel B corresponds to the medium-delay-spread case that also occurs frequently; channel C is the
high-delay-spread case that occurs only rarely. Table 12-5 provides the average RMS delay
spread values for each channel and for each environment.
B c ≈ 1 ⁄ τ dmax (12.26)
∆f = f 1 – f 2 (12.27)
Two frequencies that are farther apart than the coherence bandwidth, Bc , will fade inde-
pendently. This concept is also useful for diversity reception.
The coherence bandwidth for two fading amplitudes of two received signals is
1
∆ f > B c = ------------------ (12.28)
2πτ drms
If coherence bandwidth is defined as the frequency interval over which the channel’s complex
frequency transfer function has a correlation of at least 0.9, the coherence bandwidth is approxi-
mately given as
1
B c ≈ ----------------- (12.29)
50τ drms
For mobile radio, the model generally accepted as a useful model for the urban environ-
ment has an array of radially uniformly spaced scatters, all with equal magnitude reflection coef-
ficients but independent, randomly occurring reflection phase angles. This model is referred to
as the dense-scatter channel model. Using such a model, coherence bandwidth has been defined
for a bandwidth interval over which the channel’s complex frequency transfer function has a cor-
relation of at least 0.5 [10,11], or
0.276
B c ≈ ------------- (12.30)
τ drms
1
B c ≈ -------------- (12.31)
5τ drms
A channel is a frequency-selective channel if Bc < 1/Ts = Bw , where the symbol rate 1/Ts is
nominally taken to be equal to the signal bandwidth Bw . Frequency-selective fading distortion
occurs when a signal’s spectral components are not all affected equally by the channel.
Frequency-nonselective or flat-fading degradation occurs whenever Bc > Bw . Hence, all of
the signal’s spectral components are affected by the channel in a similar manner. Flat fading
does not introduce channel-induced intersymbol interference (ISI) distortion, but performance
degradation can still be expected due to loss in SNR whenever the signal is fading. In order to
avoid channel-induced ISI distortion, the channel must be a flat-fading channel by ensuring that
1
B c > B w = ----- (12.32)
Ts
Thus, the channel coherence bandwidth sets an upper limit on the transmission rate that
can be used without incorporating an equalizer in the receiver.
Doppler Spread 247
The GSM symbol rate (or bit rate, since modulation is binary) is 271 ksps and the band-
width is Bw = 200 kHz. If the typical RMS delay spread in an urban environment is τdrms = 2µs,
then using Eq. (12.31) the coherence bandwidth Bc ≈ 100 kHz. It is therefore apparent that since
Bc < Bw , the GSM receiver must use some form of mitigation to overcome frequency-selective
distortion. To accomplish this goal, the Viterbi equalizer [1] is typically used.
EXAMPLE 12.2
Assume vehicle speed equal to 60 mph (88 ft/sec), carrier frequency fc = 860 MHz, and delay spread
τdrms = 2 µsec. Calculate coherence time and coherence bandwidth. At a coded symbol rate of 19.2
kbps (IS-95), what kind of symbol distortion will be experienced? What type of fading will be expe-
rienced by the IS-95 channel?
v = 60 mph (= 88 ft/sec)
8
c 9.84 × 10
λ = --- = ------------------------6- = 1.1442 ft/sec
f 860 × 10
v 88
f m = --- = ---------------- = 77 Hz
λ 1.1442
1 1
T c = ------------- = ------------------ = 0.0021 seconds
2π f m 2π × 77
6
10
T s = ---------------- = 52 µsec
19,200
The symbol interval is much smaller than the channel coherence time. Therefore, symbol dis-
tortion is minimal. In this case fading is slow.
1 1
B c ≈ ----------------- = -------------------------------
- = 79.56 kHz
2πτ drms 2π × 2 × 10
–6
This shows that IS-95 is a wideband system in this multipath situation and experiences selec-
tive fading over only 6.5% ( 79.57/1228.8 = 0.0648) of its bandwidth.
1
T 0 = ----- (12.33)
fd
fd is regraded as the typical fading rate of the channel. When T0 is defined as the time dura-
tion over which the channel’s response to a sinusoid has a correlation greater than 0.5, then
248 Ch. 12 • RF Engineering and Network Planning
9
T 0 ≈ --------------- (12.34)
16π f d
A popular rule of thumb is to define T0 as the geometric mean of Eqs. (12.33) and (12.34)
9 0.423
T0 = ---------------2 = ------------- (12.35)
16π f d fd
The time required to traverse a distance λ/2 (equal to fade interval) when traveling at a
constant velocity v is
With frequency equal to 900 MHz and velocity equal to 120 km/h, the coherence time is
about 5 ms and Doppler spread is approximately 100 Hz. For a voice-grade channel with a typical
transmission rate of 10 ksps, the fading rate is considerably less than the symbol rate. Under such
conditions, the channel would manifest slow-fading effects. A channel is referred to as fast fading
if the symbol rate 1/Ts is less than the fading rate 1/T0 i.e., the fast fading is characterized by
Bw < f d (12.37a)
or
Ts > T0 (12.37b)
A channel is referred to as slow fading if the signaling rate is greater than the fading rate.
Thus, to avoid signal distortion caused by fast fading, the channel must be made to exhibit slow
fading by ensuring that the signaling rate exceeds the channel fading rate
Bw > f d (12.38a)
or
Ts < T0 (12.38b)
The channel fading rate fd sets a lower limit on the signaling rate that can be used without
suffering fast-fading distortion. A better way to state the requirement for mitigating the effects of
fast fading would be that we desire Bw » fd (or Ts « T0). If this condition is not satisfied, the ran-
dom frequency (FM) due to varying Doppler shifts will limit system performance significantly.
The Doppler effect yields an irreducible error rate that cannot be overcome by simply increasing
Eb /It . This irreducible error rate is most pronounced for any modulation that involves switching
the carrier phase. For voice-grade applications with error rates of 10–3 to 10–4, a large value of
Doppler shift is considered to be on the order of 0.01 Bw . Thus, to avoid fast-fading distortion
and Doppler-induced irreducible error rate, the signaling rate must exceed the fading rate by a
Intersymbol Interference 249
factor of 100 to 200. The exact factor depends on the signal modulation, receiver design, and
required bit error rate.
1
R b < -------- (12.39)
2τ d
In a real situation, Rb is determined based upon the required bit error rate.
Note: 10% of the path loss will exceed the MPL by more than 10.24 dB.
EXAMPLE 12.3
Refer to Figure 12-5 and use the following parameters to calculate the maximum allowable path
loss:
• Information rate = 9600 bps
• Mobile station’s effective radiated power (Pm ) = 200 mW (23 dBm)
• Base station antenna gain (Gb) = 14 dBi
• Base station receiver antenna cable loss (Lc) = 2.5 dB
• PCS minicell receiver noise figure (Fb ) = 5 dB
• Required margin (Eb /Nt ) = 6.8 dB (with diversity antenna at base station)
• Base station noise floor (N0 ) = –174 dBm/Hz
• Log-normal shadowing margin = 8 dB
• Body/orientation loss = 2 dB
• Building penetration loss = 10 dB
Base station noise floor
Gb Base Station
RF Amplifier
Lc
Fb
Gb
Mobile
CRM
Lc
Fb
EXAMPLE 12.4
Using the allowable path-loss value from Example 12.3, determine the coverage for the mini-PCS
cell. Assume the following data:
• PCS frequency (fc ) = 1800 MHz
• Street width (W) = 20 m
• Spacing between buildings (b) = 40 m
• Average roof height of building (hr) = 40 m
• Mobile antenna height (hm) = 2 m
• Base station antenna height (hb) = 40 m
• Street orientation, φ = 90 degrees
We use the COST 231 model
∆h m = h b – h m = 40 – 2 = 38 m
∆h b = h b – h r = 40 – 40 = 0 m
L 0 = 4 – 0.114 ( φ – 55 ) = 4 – 0.114 ( 90 – 55 ) = 0
15∆h fc
k a = 54, k d = 18 – --------------b- = 18, k f = 4 + 1.5 --------
- – 1 = 4 + 1.5 ------------ – 1 = 5.42
1800
∆h m 925 925
38 log r = – 35.52
log r = – 0.935 , r = 0.116 km or 116 m
EXAMPLE 12.5
Estimate the cell capacity as a function of CDMA user penetration for an overlay system with 2%
blocking for both analog and digital subscribers. Assume N = 7 as the reuse pattern for the analog
channels and N = 1 for CDMA channels. The average traffic per subscriber is 0.02 Erlangs. See
Table 12-7.
254
Table 12-6 Comparison of BS Capacity with Analog and Combined CDMA and Analog Channels
Analog Voice CDMA Traffic Analog Traffic per Total Analog CDMA Traffic per Total CDMA Total BS Traffic
Channels Channels Sector (Erlangs) Traffic (Erlangs) Sector (Erlangs) Traffic (Erlangs) (Erlangs)
12 7 462 99.22% 1.092 × 3 = 3.3 140.7 × 3 = 422.2 425.5 165 21,110 21,275
6 8 528 99.86% 0.223 × 3 = 0.7 162.4 × 3 = 487.3 488 35 24,365 24,400
0 9 594 100% 0 184.2 × 3 = 552.5 552.5 0 27,625 27,625
The Transition from an Analog System to a Digital System 255
The impact on introducing CDMA in an analog system results in reducing the cell analog
capacity by 20%, but it doubles the total capacity of the cell. This means that at least 20% of the
offered traffic load must come from dual-mode mobiles before activating CDMA. To realize 100%
capacity increase in the cell, about 60% of the offered traffic load in the cell must be from dual-mode
mobiles.
A/D A/D
A A A
A A
A A A
A/D A/D
• Disadvantages
◆ There is capacity loss due to segmentation of the cellular spectrum since there
will be fewer radio frequencies for the analog subscribers.
◆ The grade of service to analog subscribers, whose numbers may increase if ana-
log terminal dumping occurs, will require investing in additional analog base sta-
tion infrastructure.
◆ There is increased system operational complexity. The engineering, Operation,
Administration, and Maintenance (OA&M) of a two-system CDMA/analog over-
lay is much more complex than for a single system.
◆ The analog-only base stations may require additional RF filters to reduce the
probability that a nearby CDMA mobile will overload the analog base station
receiver.
A/D
A/D A/D
A/D A/D
A/D A/D
A/D A/D
A/D
• Advantages
◆ The entire system would have complete digital coverage.
◆ This scenario avoids receiver overload and other radio problems.
◆ There is no cellular spectrum segmentation.
◆ Full-spectrum efficiency is achieved through high reuse (N = 1) everywhere.
◆ Dual-mode terminals and handoffs between CDMA and analog channels are not
required (except for roaming into analog coverage areas).
◆ OA&M is simplified from that of the overlay system.
◆ The system operator can advertise digital service everywhere in the service area.
• Disadvantages
◆ It requires digital equipment everywhere in the system. Although the investment
costs can be reduced in areas that need only a low-capacity digital service, it is
still a larger investment than for the partial digital system option.
A A
A A A
A A/D
A A/D A/D
A Partial Analog
A A/D
A A
A Full Analog
A
in the core would be handed off to an analog channel as the mobile approaches the edge of the
digital coverage area, and then it would be handed to a cell in the buffer zone. Mobiles assigned
an analog channel in the analog-only cells would not transition to a digital channel once inside
the digital coverage area.
The transition zone can gradually be moved outward from the core, and digital coverage can
be expanded. The rate of expansion can be determined by the mix of terminals in the system, the
need for capacity relief, the strategy for moving the customer base to digital terminals, and eco-
nomics of the system operator. Fig. 12-8 shows an example of a simplified model with a uniform
cell size. The buffer zone between the CDMA/analog cells and analog-only cells may require two
tiers of cells depending on the propagation and relative sizes of the actual cells. If the cells in the
buffer zone are at full capacity, then adding CDMA will reduce the capacity of the buffer zone
cells since frequencies required by CDMA channels cannot be used in the buffer zone.
Fig. 12-9 shows the case where a CDMA base station interferes with the analog mobile. The
performance criterion for analog mobiles is that the carrier signal from the analog base station is
17 dB greater than the total interference on the channel. If the analog system is designed for
S anal
---------
- = 18 dB (12.46)
I coch
and if
S anal
- ≥ 17 dB
------------------------------- (12.47)
I coch + I CDMA
The Transition from an Analog System to a Digital System 259
CDMA Analog
Base Station Base Station
D
Figure 12-9 CDMA Base Station Interference with Analog Mobile
S anal
- > 24 dB
-------------- (12.48)
I CDMA
Table 12-8 lists the relative sizes of CDMA and analog base stations to achieve the criterion
as a function of separation between the CDMA and analog center frequencies. With the recom-
mended 9 guard channels, the CDMA base station has to be only slightly farther away than the
Table 12-8 Required D/Ra Ratios vs. Center Frequency Separation between CDMA and Analog
Center Frequencies: CDMA BS Interferes with Analog MS
radius of the analog cell to have adequate analog voice-quality performance. If the analog base sta-
tion assigns frequencies within the CDMA channel, then the CDMA base station must be about 3
times the analog cell radius away, or a one cell buffer zone for equal-size analog and CDMA cells.
(R = radius of the analog base station, and D = distance between analog and CDMA base stations.)
Fig. 12-10 shows a case where the CDMA mobile interferes with the analog base station.
The performance criterion for the analog base station is that the received signal be 17 dB greater
than the total received noise. If the analog system is designed for
S anal
---------
- = 18 dB (12.49)
I coch
and if
S anal
- ≥ 17 dB
------------------------------- (12.50)
I coch + I CDMA
CDMA Analog
Base Station Base Station
D
Figure 12-10 CDMA Mobile Interference with Analog Base Station
The Transition from an Analog System to a Digital System 261
Table 12-9 Required D/Ra Ratio vs. Frequency Separation between CDMA and Analog Center
Frequencies: CDMA MS Interferes with Analog BS
Table 12-9 lists the required D/R ratios as a function of the separation between the CDMA
and analog center frequencies to achieve the criterion, where D = distance between the analog
and CDMA base station and R = radius of the CDMA base station. With the recommended guard
9 channels, the CDMA mobile can be close to the analog base station before the interference
becomes a problem. This situation is less critical than the previous case.
Both rules (Tables 12-8 and 12-9) must be satisfied when deploying CDMA base stations
to prevent interference to the existing analog cells. Meeting these criteria will insure that the
interference from the analog transmitters to the CDMA receivers is not a problem as well.
The following are the advantages and disadvantages of the partial integrated design:
• Advantages
◆ The CDMA capacity advantage can be placed where it is needed most, i.e., in the
core system. Investment only for the core system will be needed.
◆ OA&M is simpler than the overlay approach.
◆ The design avoids the receiver overload problem of the overlay design.
• Disadvantages
◆ The system operator cannot advertise digital-everywhere service.
◆ Handoff is required between CDMA and analog coverage areas.
◆ IS-95 does not provide analog-to-CDMA handoff, so a call initiated in the analog
area will not provide any digital features available in the digital coverage area.
◆ Voice-quality changes may be perceived during CDMA-to-analog handoffs.
EXAMPLE 12.6
Consider a small-city cellular system that is growing at the predicted growth rate for the next 7 years
(see Table 12.10). The start-up system required 9 omnidirectional-coverage base stations and has
grown to 29 directional analog base stations to provide service for 36,000 Busy Hour Call Attempts
(BHCA). Based on the predictions, this system must expand to provide capacity for 100,000 BHCA
at the end of 7 years. The service provider has chosen to provide CDMA service over the complete
coverage area by overlaying the coverage with 10 minicells. The service provider reduces the analog
262 Ch. 12 • RF Engineering and Network Planning
subscribers gradually as indicated in Table 12.10. The traffic per subscriber during the busy hour is
0.02 Erlangs.
Year 0 (all analog) (see Fig. 12-11)
• Total traffic during busy hour: 36,000 × 0.02 = 720.0 Erlangs
720.0
• Traffic per sector: --------------- = 8.276 Erlangs
29 × 3
• Number of voice channels per sector to provide 2% blocking: 14
14
1 2 3
11 12 13
15 16 17
4 5 6
18 19
20 21 22
7 8
23 24 25
26 27
9 10
28 29
260.0
• CDMA traffic per sector: --------------- = 8.67 Erlangs
10 × 3
One CDMA channel provides 14.9 Erlangs per sector with 2% system blocking to serve the dual-
mode mobiles, so the service provider decides to eliminate all analog channels in the expanded spec-
trum and to use the spectrum for one CDMA channel in the minicell equipment. This reduces the
analog capacity by 3 channels per sector in all 29 base stations.
Table 12-11 Number of Analog and CDMA BSs and Capacity at the End of Year 0
14
1 2 3
11 12 13
15 16 17
4 5 6
18 19
20 21 22
Analog
7 8 Cell Site
23 24 25
26 27
9 10 Analog/CDMA
Cell Site
28 29
These 11 channels will carry 6.83 Erlangs of traffic at 4% blocking for the analog subscribers. The
single CDMA channel will carry all the offered traffic load with virtually no blocking for the CDMA
subscribers. If the grade of service for the analog subscribers is an unacceptable business strategy,
then additional analog capacity will have to be provided by adding additional channels in the limited
spectrum band, possibly resulting in additional cochannel interference. The results are summarized
in Table 12-12. In the calculations, we assume an average of 22 CDMA calls per sector with 2%
blocking. As can be seen, the offered CDMA traffic load (8.67 Erlangs per sector) is much lower
than the 2% blocking capacity (14.9 Erlangs per sector). CDMA subscribers will experience virtu-
ally no blocking while analog subscribers will experience 4% blocking.
Year 2 (see Fig. 12-12)
22, 000 × 0.02
• CDMA traffic per sector: ---------------------------------- = 14.67 Erlangs
10 × 3
One CDMA channel on 10 base stations with 2% blocking provides 14.9 Erlangs per sector.
24, 000 × 0.02
• Analog traffic per sector: ---------------------------------- = 5.52 Erlangs
29 × 3
• Number of analog channels per sector: 14 – 3 = 11
These 11 channels will carry 5.84 Erlangs of traffic at 2% blocking for analog subscribers. Table 12-
13 summarizes the results.
Year 3 (see Fig. 12-13)
39, 000 × 0.02
• CDMA traffic per sector: ---------------------------------- = 26.0 Erlangs
10 × 3
Two CDMA channels on 10 base stations with 2% blocking gives 34.68 Erlangs per sector.
16, 000 × 0.02
• Analog traffic per sector: ---------------------------------- = 4.64 Erlangs
23 × 3
We remove 6 analog base stations, leaving 23 base stations to carry analog traffic.
• Number of analog channels per sector: 14 – 5 = 9
Table 12-12 Number of Analog and CDMA BSs and Capacity at the End of Year 1
Table 12-13 Number of Analog and CDMA BSs and Capacity at the End of Year 2
No. of BSs No. of RF Channels/Sector Capacity Erlangs/Sector
Analog CDMA Analog CDMA Analog CDMA BHCA
29 10 11 1 5.84 14.9 46,200
The Transition from an Analog System to a Digital System 265
1 2 3
12 13
15 16
4 5 6
18 19
21
Analog
7 8 Cell Site
24 25
26 27
9 10 Analog/CDMA
Cell Site
28 29
These 9 channels will carry 4.35 Erlangs per sector of traffic at 2% blocking for the analog sub-
scribers. Since the offered traffic load is slightly more than the capacity at 2% blocking, the
analog subscribers will experience about 2.5% blocking, whereas the CDMA subscribers will
experience almost no blocking since offered load is less than the capacity. The results are sum-
marized in Table 12-14.
Year 4 (see Fig. 12-14)
Two CDMA channels on 10 base stations with 2% blocking gives 34.68 Erlangs per sector.
Table 12-14 Number of Analog and CDMA BSs and Capacity at the End of Year 3
No. of BSs No. of RF Channels/Sector Capacity Erlangs/Sector
Analog CDMA Analog CDMA Analog CDMA BHCA
23 10 9 2 4.35 34.68 55,000
266 Ch. 12 • RF Engineering and Network Planning
1 2 3
12 13
15 16
4 5 6
18 19
21
Analog
7 8 Cell Site
24
26 27
9 10 Analog/CDMA
Cell Site
Table 12-15 Number of Analog and CDMA BSs and Capacity at the End of Year 4
Three CDMA channels on 10 base stations with 2% blocking gives 55.33 Erlangs per sector.
4, 000 × 0.02
• Analog traffic per sector: ------------------------------- = 2.67 Erlangs
10 × 3
We remove 10 analog base stations, leaving 10 base stations to carry analog traffic.
• Number of analog channels per sector: 14 – 7 = 7
These 7 channels will carry 2.94 Erlangs per sector at 2% blocking. The results are summarized in
Table 12-16.
Year 6 (all digital) (see Fig. 12-16)
1 2 3
4 5 6
7 8
9 10 Analog/CDMA
Cell Site
1 2 3
4 5 6
7 8
9 10
CDMA
Cell Site
Table 12-16 Number of Analog and CDMA BSs and Capacity at the End of Year 5
No. of BSs No. of RF Channels/Sector Capacity Erlangs/Sector
Analog CDMA Analog CDMA Analog CDMA BHCA
10 10 7 3 2.94 55.33 70,000
Table 12-17 Number of Analog and CDMA BSs and Capacity at the End of Year 6
No. of BSs No. of RF Channels/Sector Capacity Erlangs/Sector
Analog CDMA Analog CDMA Analog CDMA BHCA
0 10 0 4 0 76.38 82,000
Table 12-18 Number of Analog and CDMA BSs and Capacity at the End of Year 7
We eliminate all remaining analog base stations and use 4 CDMA channels on 10 base stations with
2% blocking to give 76.38 Erlangs per sector. The results are summarized in Table 12-17.
Year 7 (see Fig. 12-16)
Four CDMA channels per sector provides 76.38 Erlangs of traffic at 2% blocking. The results are
given in Table 12-18.
PSTN
MSC
Terrestrial
Transcoder Transcoder
Facilities
Radio Radio
Facilities Facilities
PSTN
MSC
Transcoder
Terrestrial
Radio Facilities Radio
Facilities Facilities
paging channels, and traffic channels). Once this is done, the required frequency spectrum can
be determined. This section provides an analytical discussion of the capacity of the reverse radio
link and a qualitative discussion of the capacity of the forward radio link.
Unlike analog and TDMA technology, CDMA technology does not impose a definite limit
on the radio capacity. Rather, CDMA technology exercises a soft limit, in which mobile sub-
scribers experience a level of degradation that is related to the total interference and the thermal
noise. The capacity is soft since the number of mobile subscribers can be increased if the service
provider is willing to lower the grade of service and thus decrease customer satisfaction. With a
greater number of simultaneous CDMA calls, the noise floor increases. If the noise floor
increases, the probability of receiving a correct frame decreases, i.e., the FER increases. Interfer-
ence is generated by other CDMA mobile stations occupying the same radio spectrum on the
same cell or on a different cell. Moreover, for 800-MHz operation, interference is generated if a
mobile station operating in the analog mode is occupying a portion of the frequency spectrum
that is used by the CDMA channel. However, in a properly engineered CDMA system, analog
operation is restricted to cells sufficiently separated from the cell serving the CDMA mobile.
This significantly reduces the interference to the CDMA mobile.
In order for a CDMA system to achieve the expected capacity enhancement, it is imperative
that power control be properly functioning in both the forward and reverse directions of the radio
channel (refer to chapter 10). Power control is executed only on the traffic channels. However, in
the following analysis, it is not assumed that power control is perfect. This fact is reflected by
assuming that the instantaneous power varies about the desired Eb /It level with a log-normal distri-
bution having a standard deviation σc. Typical values of σc are on the order of 1.5 to 2.5 dB [12].
One method of estimating the capacity is to determine the probability that a CDMA chan-
nel does not have sufficient bandwidth to accommodate a mobile station for a given frame inter-
val and still satisfy the interference constraints. This event is called an outage. During an outage
of the reverse radio channel, the FER can exceed the desired maximum limit. This situation is
not catastrophic but does lead to degraded service. In the following analysis, the desired interfer-
ence is given by I0/N0 < 1/η. Typically, η is between 0.25 and 0.1 which corresponds to power
ratios of I0/N0 between 6 dB and 10 dB.
The explicit formula [12,13]for the normalized average user occupancy (λ/µ in terms of
Erlangs per sector) is given by
λ
--- ν ( 1 + f ) = ∆' r × F ( B, σ c ) (12.52)
µ
where: λ = average call rate for the entire CDMA system,
1
--- = average call duration,
µ
ν = voice activity factor,
–1 2
[ Q ( P out ) ]
B = ------------------------------ ,
∆' r
Facilities Engineering 271
B
------w
R
∆' r = -------- × ( 1 – η ), and
E b0
--------
Nt
3
α c⋅B
F(B, σc) = ----- 1 + ---------------- 1 – 1 + -----------------
1 4
-
αc 2 α c × B
3
in which
2
( βσ c ) ⁄ 2
αc =e
β = (ln[10])/10, and
∞
[ ( – x2 ) ⁄ 2 ]
Q(z) = ∫e d x ⁄ ( 2π )
z
Pout is the probability of outage,
f is the mean interference from neighboring cells, and
Eb0/It is the median of the desired Eb/It.
Using Eq. (12.52), the following configurations are analyzed:
1. Hard handoff only for a CDMA system with a frequency bandwidth of 1.25 MHz and
equipped with 8-kbps transcoders (see Table 12-19), Bw = 1.25 MHz, R = 9.6 kbps, and
Bw /R = 130.
2. Soft handoffs with a maximum of 2 cells with a 1.25-MHz bandwidth and equipped
with 8-kbps transcoders (see Table 12-20).
3. Soft handoffs with a maximum of 3 cells with a 1.25-MHz bandwidth and equipped
with 8-kbps transcoders (see Table 12-21).
4. Hard handoffs only with a 1.25-MHz bandwidth and equipped with 13-kbps transcod-
ers (see Table 12-22), Bw = 1.25 MHz, R = 14.4 kbps, and Bw /R = 87.
5. Soft handoffs with a maximum of 2 cells with a 1.25-MHz bandwidth and equipped
with 13-kbps transcoders (see Table 12-23).
6. Soft handoffs with a maximum of 3 cells with a 1.25-MHz bandwidth and equipped
with 13-kbps transcoders (see Table 12-24).
7. Hard handoffs only with a 10-MHz bandwidth and equipped with 8-kbps transcoders
(see Table 12-25), Bw = 10 MHz, R = 9.6 kbps, and Bw /R = 1042.
8. Soft handoff with a maximum of 2 cells with a bandwidth of 10-MHz and equipped
with 8-kbps transcoders (see Table 12-26).
9. Soft handoffs with a maximum of 3 cells with a 10-MHz bandwidth and equipped with
8-kbps transcoders (see Table 12-27).
Configurations 1, 2, and 3 correspond to wireless systems supporting standards TIA IS-95A
and TIA IS-96A 8-kbps vocoder; configurations 4, 5, and 6 correspond to wireless systems sup-
porting standards TIA IS-95A and Qualcomm’s proprietary 13-kbps vocoder; configurations 7, 8,
272 Ch. 12 • RF Engineering and Network Planning
and 9 correspond to TIA SP-2977 and TIA IS-96A. Furthermore, in all these configurations, it is
assumed that attenuation due to propagation losses decreases as the fourth power of distance and
that the log-normal component has a standard deviation of 8 dB (refer to Eq. [12.2]). The voice
activity factor ν is assumed to equal 0.4, and the standard deviation for power control σc is assumed
to be 2.5 dB. In Tables 12-19 through 12-27, we use f = 2.38 for hard handoffs, f = 0.77 for soft
handoffs with a maximum of 2 cells, and f = 0.57 for soft handoffs with a maximum of 3 cells.
Comparing Tables 12-19 to 12-27, we can make several observations:
1. Hard handoffs reduce the capacity on the reverse radio link by approximately 50% with
respect to two-way soft handoffs (Table 12-19 vis-à-vis Table 12-20).
2. If a system is equipped with 13-kbps transcoders rather than 8-kbps transcoders, the
capacity is reduced approximately 40% (Table 12-21 vis-à-vis Table 12-24). This
observation is consistent with our expectations since the rate is increased from 9.6 kbps
to 14.4 kbps (50% increase).
3. If the bandwidth increases from 1.25 MHz to 10 MHz (eightfold increase), the capacity
increases approximately 10 times (Table 12-20 vis-à-vis Table 12-26).
We investigate the effect on the reverse radio link capacity if the power control is perfect,
i.e., σc = 0. In this case, F(B, σc) in Eq. (12.52) simplifies to
F ( B, σ c ) = 1 + --- 1 – 1 + ---
B 4
(12.53)
2 B
As an example of applying Eq. (12.53), we can compare the results in Table 12-20 in
which η = 0.10, Eb0/It = 6 dB, and Pout = 0.01. In this case, λ/µ = 23.63 Erlangs. If the power con-
trol is perfect, i.e., σc = 0, λ/µ increases to 27.14 Erlangs or a 15% increase. However, Eq.
(12.53) is based upon Eq. (12.2), which may not adequately model all radio environments. In
such cases, the engineer needs to use either a more complicated mathematical model or to exe-
cute a computer simulation.
The power of the reverse link channels for a specific user is adjusted at a rate of 800 times
per second in order for the received power at the base station to provide the same minimum Eb /It
as required for the specified link quality. The accuracy of the power control affects the reverse
link capacity (see Fig. 12-19).
When determining the capacity of the reverse radio link, one must also include the capac-
ity needed to support the access channels. Both Call Setup and Registration messages are trans-
mitted on the access channel. The decrease of the capacity on the reverse radio link is small due
to supporting the access channels, typically about a 1% reduction of the supportable Erlang traf-
fic. Thus this reduction is ignored in the determination of the radio link capacity.
When designing a CDMA system for a given call load, the engineer must determine the
number of CDMA Channel Modem (CM) circuits that must be supported at each cell. A CM
operates at baseband rather than at RF frequencies. It demodulates the CDMA signal for a given
mobile station and combines signals from multiple sectors of a given cell during softer handoffs
(see Fig. 12-20). The number of CMs is affected by the number of simultaneous soft handoffs
276 Ch. 12 • RF Engineering and Network Planning
30
Change in Cell Capacity (%)
25
20
15
10
0
0 1 2 3 4 5
Std. Dev. Power Control (dB)
B F
but not upon softer handoffs. In our analysis, we assume that a CM is not dedicated to a particu-
lar sector or CDMA carrier, although this assumption is dependent upon the actual manufac-
turer’s implementation.
The exact distribution of two-way soft handoffs, three-way soft handoffs, softer handoffs,
and soft-softer handoffs is very dependent upon the radio environment and radio configuration.
The service provider needs to tune the system in order to optimize the radio link capacity. This
tuning process includes adjusting the transmitted power of the pilot channels and the threshold
levels that trigger handoffs. TIA IS-95A defines several thresholds: T_ADD, T_DROP,
Facilities Engineering 277
Table 12-28 Handoff Distribution—CDMA Formal Field Test, November 18–23, 1991
Handoff Type Mean (%) Standard Deviation (%)
Softer 62.80 19.14
Two-way soft 6.52 19.05
Soft-softer 4.42 7.90
Three-way soft 0.40 0.82
Three-way softer 0.20 0.42
No handoff 25.66 10.80
T_TDROP, and T_COMP. The base station sends the values of these thresholds in the Systems
Parameter message (which is transmitted on the paging channel) and the Handoff Direction mes-
sage or the Extended Handoff Direction message (which is transmitted on the traffic channel).
During a call, the mobile station measures the strength of the pilot channel of the serving cells
(sectors) and potential candidates. The mobile station sends a Pilot Strength Measurement mes-
sage to the base station in order to initiate a possible handoff for one of the following reasons:
1. Pilot’s signal strength of a serving cell drops below T_DROP for a duration equal to
T_TDROP.* T_TDROP is determined by the service provider and ranges from 0 to 15
seconds.
2. Pilot’s signal strength of a candidate exceeds T_ADD.†
3. Pilot’s signal strength of a candidate exceeds that of a serving cell by T_COMP.‡
As an example, Table 12-28 shows the handoff distribution exhibited during CDMA trials
in San Diego, California.
As a general rule, a CDMA system is tuned so that calls are in some form of soft handoff,
i.e., two-way soft, soft-softer, or three-way soft, for approximately 40–60% of the time. Percent-
ages greater than this often are not justified by the improvement of the call quality. It is interest-
ing to note that the aggregated results of the CDMA Formal Field Test (Table 12-28) indicate the
total soft handoff (the sum of two-way soft, three-way soft, and soft-softer handoffs) is 12% of
the time. This observation may be rationalized by the fact that calls were in total softer handoff
(the sum of softer, soft-softer, or three-way softer) 67% of the time. Also note that the standard
deviation of the handoff distributions is large, particularly for two-way soft and soft-softer hand-
offs. There are two reasons for this:
• The handoff distribution varies with the cells that are serving the call. Cells are tuned
differently in order to optimize the call capacity.
* As defined in Section 6.6.6.2.5.2 of TIA IS-95A, this pilot is contained in the Active Set.
† TIA IS-95A refers to the pilot as being in the Neighbor Set or in the Remaining Neighbor Set.
‡ TIA IS-95A refers to the pilot as being in the Candidate Set.
278 Ch. 12 • RF Engineering and Network Planning
• The handoff distribution varies with the environment of the mobile station. Even
though the mobile station may be served by the same cell, the terrain within the cell’s
domain varies sufficiently to significantly affect the handoff distributions.
When a call is in a two-way soft, soft-softer, or three-way softer handoff, two CMs are
required to support the call. When a call is in a three-way soft handoff, three CMs are needed. Only
one CM is needed for the call during a softer handoff or when no handoff configuration occurs.
EXAMPLE 12.7
Assume an equal call distribution across all cells and sectors with the same handoff distribution. The
handoff distribution is as follows: 40% softer handoff, 20% two-way soft handoff, 10% soft-softer
handoff, 29% no handoff, and 1% three-way soft handoff. There are two CDMA carriers, each hav-
ing a bandwidth of 1.25 MHz. The system is equipped with transcoders that conform to TIA IS-96A,
i.e., 8-kbps voice coding and 9.6 kbps on the physical layer. Assume η = 0.25, Eb0/I0 = 6 dB, and Pout
= 0.01. The system is configured with 10 cells, each having 3 sectors. The average call duration is 90
seconds, and each mobile subscriber generates 0.03 Erlang during the busy hour.
Determine the number of calls that can be supported per hour by the system. Determine the
number of mobile subscribers that can be provided service if 2% blocking is acceptable. Also, deter-
mine the number of CMs that must be equipped to support the calculated number of subscribers.
From Table 12-21, the capacity of the reverse radio link per sector is:
Erlangs
21.23 ------------------ × 2 carriers = 42.46 Erlangs
carrier
Thus, each sector can simultaneously support 42 CDMA channels. This does not equal the
number of simultaneous calls since some of the channels are assigned as the second and third chan-
nels for calls in softer and soft handoff. A CDMA channel is required for each sector configured in
the call (refer to Fig. 12-21).
E
D
T F H
S G
U B I
A
Q C K
P J
R N L
M
O
In order to determine the number of simultaneous calls that can be supported by the CDMA
system, we must associate each call with one sector even though the given call is being served by
multiple sectors. In this example, we assume that the call is associated with the oldest serving sector,
although there may be other assignments. If complete homogeneity is assumed, we can determine
the total number of simultaneous calls supported by the entire system by multiplying the number of
sectors (10 × 3 = 30) by the number of simultaneous calls supported by each sector. To illustrate this
point, let us determine the number of simultaneous calls supported by sector B as shown in Fig. 12-
21. Softer handoffs are served by sectors B-C and B-A; two-way soft handoffs by B-G and B-F;
three-way soft handoffs by B-G-F; soft-softer handoffs by B-C-G, B-C-J, B-C-F, B-C-N, B-A-U, B-
A-F, B-A-Q, and B-A-G; no handoffs by B. Let the number of simultaneous calls supported by the
sector be x. Then x can be determined by
x + 0.40x + 0.2x + 0.1x + 0.01x = 42
where 40% of the channels are supporting other sectors in softer handoff, 20% of the channels are
supporting other cells in two-way soft handoff, 10% of the channels are supporting other cells in
soft-softer handoff, and 1% of the channels are supporting cells in three-way soft handoff.
Thus, x equals 24 simultaneous calls per sector.
Therefore, the entire CDMA system can serve
sectors calls
10 cells × 3 ---------------- × 24 -------------- = 720 calls
cell sector
In order to determine the number of subscribers that can be supported by this system by each
sector during the busy hour, we use the Erlang-B formula. Each sector can support 24 simultaneous
calls, which is equivalent to trunks or radios. From Erlang-B tables, we find that 16.63 Erlangs per
sector can be supported during the busy hour. Thus, the number of mobile subscribers that the sys-
tem supports is determined by
Erlang Erlang sector
0.03 ------------------------ × N ( subscribers ) = 16.63 ---------------- × 3 -------------- × 10 cells
subscriber sector cell
16.63 × 3 × 10
N = ----------------------------------- subscribers
0.03
N = 16,630 subscribers
Next, we calculate the number of CMs that need to be equipped at each sector. We have
already determined that each sector can support 42 CDMA channels. If a call is in a softer or no
handoff, one CM is needed; for two-way soft handoff and softer-soft handoff, two CMs are needed;
for a three-way soft handoff, three CMs are needed. The number of CMs that need to be equipped at
each sector for supporting the traffic channels is
x + 0.2x + 0.1x + 0.01x = 42 CM
where 20% of the CMs are supporting other cells in soft handoff, 10% of the CMs are supporting
other cells in soft-softer handoff, and 1% of the CMs are supporting other cells in three-way soft
handoff.
x = 32 CM
In addition, CMs must be equipped for the access channel. Even though the access channel
has a negligible effect upon the reverse radio channel (16.31 × 0.01 = 0.02 Erlangs), a CM must be
equipped to support this channel.
280 Ch. 12 • RF Engineering and Network Planning
Regular Frame
Interfrequency measurements are
performed during an idle period.
12.17 Summary
This chapter discussed principles for engineering a CDMA system including propagation mod-
els, link budgets, and facilities engineering. However, extensive RF measurements and RF mod-
eling are needed in order to plan a real commercial system. The chapter’s intent was to provide
some tools and a better understanding toward achieving this goal. We also observed that the cal-
culated path losses with the Okumura/Hata model are about 13 to 15 dB lower than the path
losses obtained using the Walfisch-Ikegami (COST 231) model. This is because the Okumura/
Hata model neglects several important parameters such as street width and street orientation.
The chapter also covered the concepts of the delay spread, coherence bandwidth, and Dop-
pler spread. When the signal bandwidth is much larger than the coherence bandwidth, the signal
is called wideband signal and the fading is frequency selective. This means that only a portion of
the signal bandwidth fades at any instant of time. With signal bandwidth much smaller than the
coherence bandwidth, flat fading of the entire signal occurs.
With the signal symbol interval being much larger than the coherence time, the channel
fades rapidly compared to the symbol rate. This is called fast fading relative to symbol time, and
frequency dispersion occurs, causing signal distortion. With the signal symbol interval being
much smaller than the coherence time, the channel does not change during the symbol interval;
it is referred to as the slow-fading channel, relative to the symbol time. The chapter concludes
with a discussion of various schemes to transition from an analog system to a digital system.
12.18 References
1. Forney, G. D., “The Viterbi Algorithm,” Proceedings of IEEE 61(3), March 1978, pp. 268–
78.
2. Garg, V. K., and Wilkes, J. E., Wireless and Personal Communications Systems, Prentice
Hall PTR, Upper Saddle River, NJ, 1996.
282 Ch. 12 • RF Engineering and Network Planning
3. Hata, M., “Empirical Formula for Propagation Loss in Land Mobile Radio Services,” IEEE
Transactions on Vehicular Technology 29(3), 1980.
4. Jakes, W. C., ed., Microwave Mobile Communications, John Wiley, New York, 1974.
5. Motley, A. J., and Keenan, J. M., “Radio Coverage in Buildings,” British Telecom Tech.
Journal, Special Issue on Mobile Communications 8(1), January 1990, pp. 19–24.
6. Okumura, Y., Ohmori, E., Kawano, T., and Fukuda, K., “Field Strength and Its Variability in
VHF and UHF Land-Mobile Radio Service,” Rev. Elec. Communication Lab. 16, 1968, pp.
825–73.
7. Rappaport, T. S., Wireless Communications, Prentice Hall PTR, Upper Saddle River, NJ,
1996.
8. Sampei, Seiichi, Applications of Digital Wireless Technologies to Global Wireless Commu-
nications, Prentice Hall PTR, Upper Saddle River, NJ, 1997.
9. Seidel, S. Y., and Rappaport, T. S., “914 MHz Path Loss Prediction Models for Indoor Wire-
less Communications in Multifloored Buildings,” IEEE Trans., Antennas & Propagation
40(2), February 1992.
10. Sklar, B., “Rayleigh Fading Channels in Mobile Digital Communication Systems—Part I:
Characterization,” IEEE Communication Magazine 35(9), September 1997, pp. 136–46.
11. Sklar, B., “Rayleigh Fading Channels in Mobile Digital Communication Systems—Part II:
Mitigation,” IEEE Communication Magazine 35(9), September 1997, pp. 148–55.
12. Viterbi, Andrew J., “CDMA Principles of Spread Spectrum Communication,” Addison-Wes-
ley Publishing Company, Reading, MA, 1995.
13. Viterbi, Audrey M., and Viterbi, Andrew J., “Erlang Capacity of a Power Controlled CDMA
System,” IEEE Journal on Selected Areas in Communications, August 1993.
14. Walfisch, J., and Bertoni, H. L., “A Theoretical Model of UHF Propagation in Urban Envi-
ronment,” IEEE Trans., Antennas & Propagation, to be published.
15. Weissberger, M. A., “An Initial Critical Summary of Models for Predicting the Attenuation
of Radio Waves by Trees,” ESD-TR-81-101, Electromagnet Compat. Analysis Center,
Annapolis, MD, July 1982.
C H A P T E R 1 3
13.1 Introduction
The CDMA system is an interference-limited system in which link performance depends on the
ability of the receiver to detect a signal in the presence of interference. In order for a CDMA link
to perform satisfactorily, the designer must specify a frame error rate (FER). Field trials help the
designer to establish the required Eb/It values on the reverse link and various channels of the for-
ward link that will maintain the specified FER. The key issue in CDMA network design is to
minimize multiple access interference. Power control is critical to reduce multiaccess interfer-
ence. Designers must include the interference from other cells in the system to determine the
actual reuse factor in the CDMA system.
In the forward direction (BS to MS) a pilot signal is used by the mobile demodulator to
provide a coherent reference that is effective even in a fading environment because the desired
signal and pilot fade together. In the reverse direction (MS to BS), no pilot is used for power effi-
ciency considerations because, unlike the forward direction, an independent pilot would be
required for each signal. A modulation consistent with, and relatively efficient for, noncoherent
reception is used for the reverse link.
The maximum number of mobiles that can be supported on the forward link of a CDMA
system is different from the maximum number that can be supported on the reverse link. Nor-
mally, the capacity of a CDMA system depends upon the reverse link capacity. The forward link
capacity is governed by the total transmitted power of the cell site and its distribution to traffic
channels and other overhead channels including the pilot, paging, and sync channels. If the
power amplifier cannot provide enough power to the forward traffic channels, system capacity
may become forward link limited. Soft handoffs improve the capacity of the reverse link; how-
ever, they also affect the capacity of the forward link—the forward link capacity is reduced by
the number and types of soft handoffs.
283
284 Ch. 13 • Reverse and Forward Link Capacity of IS-95 CDMA System
This chapter presents procedures for calculating the capacity of the reverse and forward
links of a CDMA system. We establish the relationship for determining the pole point or asymp-
totic cell capacity that can be achieved as the power received at the base station from a mobile
approaches infinity. We also relate the ratio of the received cell power to cell noise with cell
loading. The chapter also covers a procedure to develop a link safety margin parameter for each
of the forward link channels.
E Bw Sr Sr
-----b- = ------ ⋅ ---------------------------------------------------------------- = G p ⋅ ---------------------------------------------------------------- (13.5)
It
R [ N 0 Bw + ( M – 1 ) ⋅ ν f ⋅ Sr ] [ N 0 Bw + ( M – 1 ) ⋅ ν f ⋅ Sr ]
1 N 0 ⋅ Bw
M = 1 + G p ⋅ ---------------------------- – -----------------
- (13.7)
( Eb ⁄ I t ) ⋅ ν f Sr ⋅ ν f
and solving Eq. (13.5) for Sr , we get:
( Eb ⁄ I t ) ⋅ N 0
S r = -----------------------------------------------------
-
1 ( M – 1 )ν f ( E b ⁄ I t ) (13.8)
--- – ------------------------------------------- -
R Bw
If we include an interference factor f (see section 13.4) from the other cells, we can rewrite
Eq. (13.5) as
E Sr
-----b- = G p ⋅ --------------------------------------------------------------------------------- (13.9)
It N 0 ⋅ Bw + ( M – 1 ) ⋅ ν f ⋅ Sr ( 1 + f )
We also include an imperfect power control factor, ηc, and rewrite Eq. (13.9) as
E Sr
-----b- = G p ⋅ ---------------------------------------------------------------------------------------------------- (13.10)
It Bw ⋅ N 0 + ( M – 1 ) ⋅ ν f ⋅ ( Sr ⁄ ηc ) ⋅ ( 1 + f )
286 Ch. 13 • Reverse and Forward Link Capacity of IS-95 CDMA System
Mmax is called the pole point or asymptotic cell capacity that is achieved when Sr → ∞. For sim-
plification we neglect 1 and rewrite Eq. (13.13) as
ηc
M max ≈ G p ⋅ ------------------------------------------------------- (13.14)
( Eb ⁄ I t ) ⋅ ( ν f ) ⋅ ( 1 + f )
To gain further insight into the capacity dynamic, we can rewrite Eq. (13.12) as
Sr ⁄ ηc 1
-------------- = ------------------------------------------------------------------ (13.15)
N 0 Bw M max ⋅ ν f ⋅ ( 1 + f ) ⋅ ( 1 – ρ )
P rec ρ
------------- = ------------ (13.16)
N 0 Bw 1–ρ
Since total power Ptotal is equal to Prec + N0 Bw , we can rewrite Eq. (13.16) as
P total P rec + N 0 B w ρ 1
------------- = ----------------------------
- = ------------ + 1 = ------------ (13.17)
N 0 Bw N 0 Bw 1–ρ 1–ρ
Reverse Link Capacity 287
0.6
0.5
Signal-to-Noise Ratio (SNR)
0.4
0.3
0.2
0.1
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Cell Loading (%) ρ
10
8
Total Received Power-to-Noise Ratio
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Cell Loading (%) ρ
2.55 2.55
M sector = 31 × ---------- ≈ 26 or M sector = 25 × ---------- ≈ 21
3 3
The capacity range of a sector will be 21 to 26. In practice, sector loading is often limited to 0.5–
0.7 of the calculated values, giving an average number of mobiles per sector equal to 13–16.
EXAMPLE 13.1
Calculate the required Eb /It using the following parameters: Bw = 1.23 MHz; R = 9.6 kbps; Pm = 63
mW (18 dBm); Lc = –2 dB; Gm = 0 dB; Lp = –135 dB; Mfade = –8 dB; Gb = 9 dB; F (noise figure) = 5
dB; T = 290 degrees Kelvin (K); kb = Boltzmann’s constant = 1.380662 × 10–23; νf = 0.4; M = 20.
Assume all other parameters to be 0.
The received signal power will be
S r = P m + L c + G m + G b + L p + M fade
E B Sr
-----b- = -----w- ------------------------------------------------------
-
It R [ N 0 B w + ( M – 1 )ν f S r ]
6 – 11.8
E 1.23 × 10 10
3
- × -------------------------------------------------------------------------------------------------------------------
-----b- = ------------------------ – 17 6 – 11.8
- dB
It 9.6 × 10 [ 1.266 × 10 × 1.23 × 10 + 19 × 0.4 × 10 ]
Reverse Link Capacity 289
– 11.8 – 0.8
E 128 × 10 128 × 10
-----b- = --------------------------------------------------------
– 11
- = ---------------------------- = 7.345 = 8.66 dB
It 10 [ 1.5557 + 1.2045 ] 2.7602
EXAMPLE 13.2
For the IS-95 CDMA system, a chip rate of 1.2288 Mcps is specified for the data rate of 9.6 kbps
(i.e., 8-kbps vocoder). The required Eb /It is specified as 7.0 dB. Calculate the pole capacity. What is
the average number of mobiles that can be supported by a sector of the three-sector cell?. Assume:
interference factor from the neighboring cells f = 0.55; the voice activity factor νf = 0.5; the power
control accuracy factor = 0.80; the gain due to sectorization = 2.55. Assume all other parameters to
be 0. How much reduction in sector capacity will occur with a 13.0-kbps vocoder provided all other
things remain unchanged?
ηc
M max ≈ G p ⋅ ------------------------------------------------------
-
( Eb ⁄ I t ) ⋅ ( ν f ) ⋅ ( 1 + f )
6
B 1.23 × 10 E
G p = -----w- = ------------------------
3
- = 128 , -----b- = 7 dB = 5.0
R 9.6 × 10 It
128 × 0.80
M max = ---------------------------------------------------- = 26.42
5.0 × 0.5 × ( 1 + 0.55 )
26.42 × 2.55
Average subscriber/sector = ------------------------------ = 22.46 ≈ 22
3
With a 13.0-kbps vocoder ( data rate R = 14.4 kbps), the processing gain will be
6
1.23 × 10
G p = ------------------------3- = 85.4
14.4 × 10
The reduction in sector capacity will be
128 – 85.4
= ------------------------- × 100 = 33.28%
128
EXAMPLE 13.3
A total of 36 equal-power mobiles share a frequency band through a CDMA system. Each mobile
transmits information at 9.6 kbps with a DSSS BPSK-modulated signal. Calculate the minimum
chip rate of the PN code in order to maintain a bit error probability of 10–3. Assume: interference fac-
tor from other cells f = 0.60; voice activity factor νf = 0.5; power control accuracy factor = 0.8.
–E ⁄ I
2E e b t
Bit error probability for BPSK P b = Q --------b- ≈ ----------------------------- = 10
–3
It 2 π( E ⁄ I )
b t
E
Required -----b- ≈ 4.8 = 6.8 dB
It
290 Ch. 13 • Reverse and Forward Link Capacity of IS-95 CDMA System
Gp 1 1
- × ------------ × ----- × 0.8
M = 36 = ------------
Eb ⁄ I t 1 + f v f
G 1 1
------p- × ------- × ------- × 0.8 = 36
4.8 1.6 0.5
∴G p = 172.8
3
Chip rate = 172.8 × 9.6 × 10 = 1.6588 Mcps
EXAMPLE 13.4
Calculate the Erlang capacity of a sector for a three-sector cell using the following parameters: car-
rier bandwidth, Bw = 1.23 MHz; RS2 R = 14.4 kbps; required Eb /It = 7 dB; voice activity factor νf =
0.4; interference due to other cells f = 0.6; three-sector antenna gain α = 2.61; cell loading factor ρ =
0.54; outage or call blocking probability Pout = 2%.
6
B 1.23 × 10
G p = -----w- = ------------------------3- = 85.4
R 14.4 × 10
Gp 1 1 85.4 1 1
M max = 1 + ------------------------- ⋅ ----- ⋅ ------------ ⋅ α = 1 + ------------- ⋅ ------- ⋅ ---------------- ⋅ 2.61 = 70.4
( E b ⁄ I t ) reqd v f 1 + f 5.012 0.4 1 + 0.6
• Low-speed mobiles, speed ≤ 5 mph: 5 dB. In this case, the duration of fades is much
larger than the time between power control updates for a mobile. Thus, the effect of any
fade is compensated by a quick response of the power control mechanism.
• Medium-speed mobiles, speed ≈ 30 mph: 7 dB. The advantages of high or low speed
are not applicable; therefore, the required Eb /It is somewhat higher.
• High-speed mobiles, speed ≥ 60 mph: 6 to 6.5 dB. In this case, the fade duration is
smaller compared to chip length. Thus, only burst errors occur on the links that are cor-
rected by interleaving and Viterbi decoding. Therefore the required Eb /It is low.
The key issue in a CDMA network design is to minimize multiple access interference.
Power control is critical to multiaccess interference. Each cell controls the transmit power of its
own mobiles. However, a serving cell is unable to control the power of mobiles in the neighbor-
ing cells. The mobiles in the neighboring cells introduce additional interference, thereby reduc-
ing the capacity of the reverse link. In Eq. (13.10) we include this effect by a factor f. The
interference from other cells determines the actual reuse factor of the CDMA system. CDMA
networks are designed to tolerate a certain amount of interference and, therefore, have a capacity
advantage over TDMA or FDMA in this regard.
M I0
ρ = ------------ ≈ ----------------- (13.18)
M max I 0 + N 0
Using these assumptions, it has been shown in reference [5] that the blocking or outage proba-
bility pout is
∞
– ( λv f ) ⁄ µ v f λ K 1
-------- ∆ r' – ( v f λ ) ⁄ µ
p out = e ⋅ ∑ µ K!
⋅ ------ ≈ Q ---------------------------------
(v λ) ⁄ µ
(13.21)
K ∆ r' f
G p(1 – η)
where ∆' r = ------------------------ , and
( E b ⁄ I t ) sp
1
--- = the ratio of total interference plus thermal noise power to thermal noise power.
η
By taking into account the interference from other cells and an imperfect power control,
Eq. (13.21) can be modified as
2
( βσ c ) ⁄ 2
∆ r' – v f ( λ ⁄ µ ) ( 1 + f )e
p out ≈ Q -----------------------------------------------------------------------2- (13.22)
( βσ c )
v f ⋅ (λ ⁄ µ) ⋅ (1 + f ) ⋅ e
Erlang Capacity of a Single Cell 293
( λ ⁄ µ ) ⋅ v f ⋅ ( 1 + f ) = ∆ r' ⋅ F ( B, σ c ) (13.23)
–1 2
[ Q ( P out ) ]
where B = ------------------------------ , and
∆ r'
3
1 αc B 4
F(B, σc ) = ----- ⋅ 1 + ---------- 1 – 1 + ---------
- in which
αc 2 α B
3
c
2
( βσ c ) ⁄ 2
αc =e ; β = ( 1n10 ) ⁄ 10 = 0.2303
EXAMPLE 13.5
Find the Erlang capacity of a CDMA cell assuming
• Blocking or outage probability (Pout) = 1%
• Log-normal shadowing margin (Mfade) = 8 dB
• Path-loss exponent (γ) = 4
• Voice activity factor (vf) = 0.4
• Other cell interference factor (f) = 0.55
• Spreading bandwidth (Bw ) = 1.23 MHz
• Data rate (R) = 9.6 kbps
• (Eb /It)sp = 7 dB = 5.0
• 1/η = 10
• σc = 2 dB = 1.5849
6
–1 Gp 1.23 × 10 ( 1 – 0.1 )
- ⋅ ( 1 – η ) = ------------------------
Q ( 0.01 ) = 2.33 ; ∆ r' = --------------------- - ⋅ --------------------- = 23.04
( E b ⁄ I t ) sp 9.6 × 10
3 5
2
( 0.2322 × 1.5849 ) ⁄ 2
αc = e = 1.0701
2
( 2.33 )
B = ----------------- = 0.2356
23.04
3
( 1.0701 ) × 0.2356
F ( B, σ c ) = ---------------- 1 + ---------------------------------------------- 1 – 1 + ---------------------------------------------
-
1 4
= 0.5494
1.0701 2 ( 1.0701 ) × 0.2356
3
λ 23.04 × 0.5494
--- = ------------------------------------ = 20.42 Erlangs
µ 0.4 ⋅ ( 1 + 0.55 )
The number of users from the Erlang B table at 1% blocking ~ 30.
294 Ch. 13 • Reverse and Forward Link Capacity of IS-95 CDMA System
Note for the pilot channel Ec /It is used instead of Eb /It —this is because the pilot channel does not
carry any information. Energy per chip, Ec , is used, the chip rate being 1.2288 Mcps.
The forward link budget is used to confirm that quantities in Eqs. (13.24a–d) are positive
and that there is sufficient margin for the forward link to perform efficiently. Of Mpilot, Mtraffic,
Msync, and Mpaging, the first two are more critical. If these two are positive, then the other two are
also likely to be positive. For perfect link balance, all margin parameters should be 0, particu-
larly Mpilot and Mtraffic. The suggested values for the specified Eb /It and Ec /It parameters are
• Pilot channel: (Ec /It )sp = –15 dB
• Traffic channel: (Eb /It )sp = 7 dB
• Sync channel: (Eb /It )sp = 7 dB
• Paging channel: (Eb /It )sp = 7 dB
Forward Link Capacity 295
We use the following assumptions for the CDMA forward link budget:
1. All mobiles are
◆ at the cell edge
◆ at least in two-way soft handoff
◆ traveling at a medium speed
◆ (Eb /It ) = 7 dB for 1% FER
2. Power control is working perfectly for all mobiles.
3. Total forward link traffic channels’ power is equally divided among all mobiles.
Forward link capacity depends on the power that is available for the traffic channels. The
power allocation to each overhead channel (i.e., Ppilot, Psync, and Ppaging) is determined from field
tests. The suggested power allocations for the forward link channels are
• Ppilot = 15–20% Pcell-site
• Psync = 10% of Ppilot = 1.5–2% Pcell-site
• Ppaging = 30–40% of Ppilot = 7% Pcell-site
• Ptraffic = [1 – (0.2 + 0.02 + 0.07)] = 71–76.5% Pcell-site
Note that Ppaging and Ptraffic represent the total allocated power for all the paging and traffic chan-
nels, respectively, and Pcell-site is the total transmit power of the cell site.
M total = M ( 1 + ξ co ) (13.26)
Table 13-2 Channel Overhead Factor for Various Types of Soft Handoffs
Type of Handoff % Area in Handoff ξco
It is the interference plus noise density measured on the pilot channel). The mobile reports the
results of these comparisons to the serving cell. The serving cell decides whether or not the
mobile needs handoff. The Ec /It of the pilot channel is important for determining whether or not
the mobile is within the coverage area of the particular cell. The pilot signal from a cell is trans-
mitted at a relatively higher power than those of other forward link logical channels (i.e., paging,
sync, traffic). In order to set up a call, the mobile must receive the pilot signal successfully. The
pilot channel acts as a coherent carrier phase reference for demodulation of other logical chan-
nels on the forward link. Since the Ec /It effectively determines the coverage area of a cell or sec-
tor, it is essential that the Ec /It be sufficiently large.
We assume that the power received from Q cells or sectors is significant and that all other
cells’ power is negligible. We assume that all cell sites beyond the second ring around a serving
cell contribute negligible received power, so that Q ≤ 18. The received bit energy-to-interference
plus thermal noise for the mth mobile will be [4]
Bw ωm ( S1 )m
E b Φ ⋅ ------ ⋅ ----------------------------------------------
t R Q ( S j )m -
-----
- ≥
I t m (13.29)
∑ ( S j ) m + N 0 B w
j=1
where Φt = fraction of total cell-site power assigned to traffic channels,
(1 – Φt) = fraction of total cell power that is assigned to transmission of overhead chan-
nels (pilot, sync, and paging channels),
Forward Link Capacity 297
∑ ωi ≤ 1 (13.30)
i=1
Q
( Eb ⁄ I t )m ∑ j + ------------
ω m ≤ --------------------- 1 + j = 2
( S ) σn
2
- (13.31)
Φt G p ------------------- ( S1 )m
( S1 )
m
Q
= 1 + ∑ j
S
fm (13.32)
-------------
j=2
S -
1 m
Next we combine Eq. (13.30) and Eq. (13.31) to get
M M 2
G p Φt σn
∑ f i ≤ -------------
Eb ⁄ I t
– ∑ ----------
( S1 )i
- = ∆f (13.33)
i=1 i=1
Generally the background noise is well below the total largest received cell-site signal power
and the second term in Eq. (13.33) is typically negligible relative to the first term. The capacity
can be estimated from the outage or blocking probability, defined as
P out = p r [ BER > ( BER ) sp ] (13.34)
where (BER)sp = specified bit error rate for which Eb /It is equal to (Eb / It)sp.
We compute ∆ 'f for (Eb /It )sp from Eq. (13.33) and express the outage or blocking probability as
298 Ch. 13 • Reverse and Forward Link Capacity of IS-95 CDMA System
M
p out = p r ∑ f i > ∆ f' (13.35)
i=1
M
The distribution of ∑ f i cannot be expressed in a closed form. The simulation results for
i=1
the blocking probability for the forward link of IS-95 are shown in Fig. 13-3 for Gp = 128, with
20% of the transmitted power in the cell/sector to the pilot channel and with the required Eb /It =
5 dB for the traffic channel to ensure BER ≤ 10–3 [2]. The reduction of 2 dB relative to reverse
link is justified by the coherent reception using the pilot as a reference, as compared to the non-
coherent detection in the reverse link. In the simulation, powers from base stations were repre-
sented as the product of the fourth order of distance and a log-normally distributed attenuation.
With these parameters, the forward link can support the BER of 10–3 for more than 99% of the
time for 38 mobiles per sector or 114 mobiles per cell.
EXAMPLE 13.6
Using the following parameters of an IS-95 CDMA system, estimate the sector capacity based on
reverse and forward link performance.
• Spreading bandwidth (Bw ) = 1.23 MHz
• Data rate (R) = 9.6 kbps
• 1/η = 10
• Outage or blocking probability (Pout) = 1%
• (Eb /It)sp for the reverse link = 7 dB = 5.0
• (Eb/It)sp for the forward link = 5 dB
0.1
Bit Error Rate Probability
Pr (BER) > 0.001)
0.01
0.001
0.0001
30 35 38 40 45
Number of Users/Sector
Figure 13-3 Forward Link Capacity of a Cellular CDMA System
Forward Link Capacity 299
3
( 1.0875 ) × 0.2356
F ( B, σ c ) = ---------------- 1 + ---------------------------------------------- 1 – 1 + ---------------------------------------------
-
1 4
= 0.5339
1.0875 2 ( 1.0875 ) × 0.2356
3
0
For perfect power control α c = e = 1
--λ- 14.91
= ---------------- = 17.27 Erlangs
µ perfect 0.8635
From the Erlang B table at 1% blocking with 14.91 Erlangs, ≈ 23 mobiles can be supported per sec-
tor, whereas with perfect power control we can support ≈ 27 mobiles. We lose about 15% of the sec-
tor capacity due to imperfect power control. With a loading factor of about 70%, the reverse link
capacity will be about 16 mobiles per sector.
Forward Link
From Fig. 13-3 we can see that the forward link can support 38 mobiles per sector with perfect
power control. If we assume the same accuracy of the power control as on the reverse link, the sector
capacity will be reduced to
No. of mobiles per sector ≈ 38 × 0.8635 = 33
Next we consider the effect of soft handoffs on forward link capacity. If the channel overhead
factor is ξco = 0.85, the sector capacity based on the performance of the forward link will be
33
Sector capacity = ---------- ≈ 18
1.85
300 Ch. 13 • Reverse and Forward Link Capacity of IS-95 CDMA System
In this example, the sector capacity is controlled by forward link performance. In practice, a
loading factor of about 70% is often suggested; this will give the sector capacity about 13 mobiles.
Note that the sector capacity of the forward link is significantly affected by total percentage and dis-
tribution of soft handoffs.
p m ⋅ L p ( r ) ⋅ G' b ⋅ G' m
SIR ( r ) = ---------------------------------------------------------------------------------------------------------------- (13.36)
[ N 0 B w ] cell + [ M ⁄ f r – 1 ] ( v f ⋅ p m )L p ( r )G' b G' m
[ M ⁄ f r – 1 ] ( [ v f ⋅ p m ] ⋅ L p ( r )G' b G' m ) 1
1 + -----------------------------------------------------------------------------------------
- = ------------ (13.37)
N 0 Bw 1–ρ
• Forward link cell size. On the forward link, the parameter that determines the cell
size is the pilot Ec /It which is given as
E φ p ⋅ p c ⋅ L p ( r ) ⋅ G' b ⋅ G' m φ p ⋅ pc ⋅ T ( r )
-----c = -------------------------------------------------------------------------------
- = -------------------------------------------------------------------------
-
It [ N 0 B w ] mob + I oc ( r )B w + I 0 ( r )B w [ N 0 B w ] mob + I 0 ( r )B w ⋅ ( 1 + ξ )
φ p ⋅ pc ⋅ T ( r )
= ------------------------------------------------------------------
- (13.41)
[ N 0 B w ] mob + p c T ( r ) ( 1 + ξ )
( E c ⁄ I t ) ( N 0 B w ) mob
T ( r ) = ---------------------------------------------------------
- (13.42)
pc [ φ p – ( Ec ⁄ I t ) ( 1 + ξ ) ]
( Ec ⁄ I t ) ⁄ 10
ξ ⁄ 10
L p ( r ) = ( E c ⁄ I t ) min + ( N 0 B w ) mob – p c – 10 log [ φ p – ( 10 ) ( 1 + 10 )]
min
EXAMPLE 13.7
Calculate transmission loss vs. cell loading for a 200-mW mobile unit. Assume: (Eb /It )min = 7 dB;
processing gain at the cell site = 21 dB; cell noise figure = 5 dB.
(SIR)min + processing gain = (Eb /It )min
(SIR)min = 7 – 21 = –14 dB
– 23 6 3
( N 0 B w ) cell = [ 3.1622 × 290 × 1.38066 × 10 × 1.2288 × 10 ] × 10 mW = –108 dBm
= – 145 – 10 log ( 1 – ρ ) dB
Fig. 13-4 shows a plot of T(r) vs. ρ.
EXAMPLE 13.8
Plot maximum transmission loss (dB) vs. % of power allocated to the pilot channel. Assume:
(Ec /It )min = –15 dB; mobile noise figure = 8 dB; Ioc /Io ~ 2.5 dB; cell-site output = 44 dBm.
( E c ⁄ I t ) min ⁄ 10 I oc ⁄ I o
T ( r ) = ( E c ⁄ I t ) min – p c + ( N 0 B w ) mob – 10 log [ φ p – ( 10 ) ( 1 + 10 )]
-134
-136
Reverse Link Max. Transmission Loss (dB)
-138
-140
-142
-144
-146
0 0.1 0.2 0.3 0.4Cell Loading
0.5 (%) P 0.6 0.7 0.8 0.9 1
-144
-146
-148
Max. Transmission Loss (dB)
-150
-152
-154
-156
-158
-160
0 5 10 15 20 25 30 35 40 45
% of Power Allocated to Pilot Channel φp
% of Power Allocated to Pilot Channel φp
Figure 13-5 Transmission Loss vs. Percent of Power Allocated to the Pilot Channel
304 Ch. 13 • Reverse and Forward Link Capacity of IS-95 CDMA System
Based on Bf , the system designer can decide which link is the limiting factor. If Bf < 0, the sys-
tem is forward link limited; Bf = 0, links are balanced; if Bf > 0 the system is reverse link limited.
A more realistic rule is
Bf < – δ: the system is forward link limited
|Bf | ≤ δ: the two links are balanced
Bf > δ: the system is reverse link limited
δ is the parameter that takes into account the tolerance in all factors involved in calculating Bf . A
good system design should insure that the two links are balanced. This makes handoff transition
smoother and reduces the amount of interference.
EXAMPLE 13.9
Using the following data, calculate the power allocated to the pilot channel. What is the allocated
power for the pilot channel to balance the forward and reverse link?
• Maximum mobile power (pm ) = 200 mW (23 dBm)
• Maximum cell-site power (pc) = 10 W (40 dBm)
• Voice activity factor (vf ) = 0.4
• Processing gain at the base station = 21 dB
• Number of users per cell (M) = 20
• Cell loading factor (ρ) = 0.5
• Cell noise figure (Fcell ) = 5 dB
• Mobile noise figure (Fmob)= 8 dB
• Cell-site antenna gain including cable loss (G'b ) = 6 dB
• Mobile antenna gain including cable loss (G'm ) = 0 dB
• Ioc /Io = 2.5 dB
• (Ec /It )min = –15 dB
• (Eb /It )min = 7 dB
(SIR)min + processing gain = (Eb /It )min
(SIR)min = –21 + 7 = –14 dB
Using Eq. (13.39), the path loss (cell site) on the reverse link is
L p ( r ) = – 14 – 108 – 23 – 6 – 10 log ( 1 – 0.5 ) = – 148 dB
T ( r ) = – 142 dB
From Eq. (13.42)
( I ⁄ I ) ⁄ 10
( E c ⁄ I t ) min [ ( N 0 B w ) mob + p c ⋅ T ( r ) ( 1 + 10 oc o ) ]
φ p = ---------------------------------------------------------------------------------------------------------------------------
-
pc ⋅ T ( r )
pc = 104
T(r) = 10–14.2
(N0Bw )mob = –105 dB = 10–10.5
(Ec /It )min = –15 dB = 10–1.5 = 0.03163
Forward Link Budget 305
– 10.5 4 – 14.2
0.03163 ⋅ [ 10 + 10 ⋅ 10 ⋅ ( 1 + 1.7783 ) ]
φ p = -----------------------------------------------------------------------------------------------------------------
4 – 14.2
- = 0.1078 = 10.78%
10 ⋅ 10
For the balanced condition, we use Eq. (13.45) with Bf = 0 and solve for φp
– 1.5
φ p – 10 ( 1 + 1.7783 )
0 = [ – 14 – ( – 15 ) ] + [ – 108 – ( – 105 ) ] + [ 40 – 23 ] + 10 log -------------------------------------------------------
-
0.5
∴φ p = 0.1037 = 10.37%
EXAMPLE 13.10
Consider a minicell in which the maximum transmission loss is equal to –112 dB. The other data
include
• [N0Bw ]mob = –105 dB
• [N0Bw ]cell = –108 dB
• [Eb /It]min = 7 dB
• [Ec /It ]min = –15 dB
• Cell loading = 50%
• Ioc /Io = 2.5 dB
Find the output of the mobile and cell site.
From Eq. (13.39)
–112 = –14 – 108 – pm – 10 log (1 – 0.5)
pm = –7 dBm (= 0.2 mW)
For the minicell, the pilot strength can be determined as
E c
---- φp
- = -----------------------
-
I t min 1 + I oc ⁄ I o
E
∴φ p = -----c ( 1 + I oc ⁄ I o ) = 10 ⋅ ( 1 + 10 ) = 0.0879 ~ 9%
– 1.5 0.25
I t min
From Eq. (13.43)
E ( E c ⁄ I t ) min ⁄ 10
T ( r ) = -----c – p c + [ N 0 B w ] mob – 10 log [ φ p – ( 10
( I ⁄ I ) ⁄ 10
) ( 1 + 10 oc o ) ]
I t min
– 1.5 0.25
∴– 112 = – 15 – p c + ( – 105 ) – 10 log [ 0.09 – ( 10 ) ( 1 + 10 )]
p c = – 15 + 112 – 105 + 26.7 = 18.7 dBm (~ 74 mW)
Ec Ec
M pilot = ----- – ----- (13.46a)
I t rec I t sp
Eb Eb
M traffic = ------ – ------ (13.46b)
I t rec I t sp
Eb Eb
M sync = ------ – ------ (13.46c)
I t rec I t sp
Eb Eb
M paging = ------ – ------ (13.46d)
I t rec I t sp
P traffic
- = P traffic – 10 log α chan – 10 log M total dBm
P ( traffic ) ⁄ ( user ) = --------------------------------- (13.48)
( M total ⋅ α chan )
in which Lp = average propagation path loss between cell site and mobile (dB),
Lpent = penetration loss (dB),
Lb = body/orientation loss (dB),
Lc = cell-site feeder loss (dB),
Mfade = margin for log-normal shadowing (dB),
Gm = mobile antenna gain (dB), and
Gb = cell-site antenna gain (dB).
In-cell interference is caused by other users radiated from the same cell and is given as
0.1P r, total 0.1P r, ch
I ss-ch = 10 log ( 10 – 10 ) – 10 log B w dBm/Hz (13.54)
E b
----- 0.1 N 0 0.1 I pilot
- = P r, pilot – 10 log B w – 10 log ( 10 + 10 ) dB (13.60)
I t rec, pilot
308 Ch. 13 • Reverse and Forward Link Capacity of IS-95 CDMA System
E b
----- 0.1 N 0 0.1 I paging
- = P r, paging – 10 log R paging – 10 log ( 10 + 10 ) dB (13.61)
I t rec, paging
E b
----- 0.1 N 0 0.1 I sync
- = P r, sync – 10 log R sync – 10 log ( 10 + 10 ) dB (13.62)
I t rec, sync
E b
----- 0.1 N 0 0.1 I traffic
- = P r, ( traffic ) ⁄ ( user ) – 10 log R traffic – 10 log ( 10 + 10 ) dB (13.63)
I t rec, traffic
EXAMPLE 13.11
Use the following data to calculate link safety margin parameters for the forward link channels of a
CDMA system.
• Pilot channel ERP (Ppilot) = 33.8 dBm
• Sync channel ERP (Psync) = 23.8 dBm
• Paging channel ERP (Ppaging) = 29.5 dBm
• Traffic channels ERP (Ptraffic) = 41.0 dBm
• Number of users per sector on the reverse link = 13
• Channel overhead due to soft handoff (ηco) = 0.85
• Path loss between cell site and mobile (Lp) = –130.2 dB
• Penetration loss (Lpent) = –15 dB
• Body/orientation loss (Lb) = –2 dB
• Fade margin (Mfade) = –10.3 dB
• Mobile antenna gain (Gm) = 2 dB
• Cell-site antenna gain (Gb) = 13 dB
• Cable losses (Lc) = –1.5 dB
• Channel activity factor (αchan)= 0.42
• Bandwidth (Bw ) = 1.2288 MHz
• Traffic channel rate = 9600 bps
• Sync channel rate = 1200 bps
• Paging channel rate = 4800 bps
• Cell reuse factor (fr ) = 0.65
4.1 3.38 2.95 2.38
P total = 10 log [ 10 + 10 + 10 + 10 ] = 42.0734 dBm
Mtotal = 13 (1 + 0.85) = 24
P ( traffic ) ⁄ ( user ) = 41.0 – 10 log ( 0.42 ) – 10 log 24 = 30.9654 dBm
E c
---- 6 – 16.597 – 16.165
- = – 110.2 – 10 log ( 1.2288 × 10 ) – 10 log ( 10 + 10 ) = – 10.82 dB
I t rec, pilot
E b
----- – 16.597 – 16.10157
- = – 120.2 – 10 log ( 1200 ) – 10 log ( 10 + 10 ) = 8.83 dB
I t rec, sync
E b
----- – 16.597 – 16.12
- = – 114.5 – 10 log ( 4800 ) – 10 log ( 10 + 10 ) = 8.64 dB
I t rec, paging
E b
----- – 16.597 – 16.1306
- = – 113.0346 – 10 log ( 9600 ) – 10 log ( 10 + 10 ) = 7.18 dB
I t rec, traffic
13.10 Summary
In this chapter, we developed necessary equations to calculate the reverse and forward link
capacity of an IS-95 CDMA system. We found that the maximum number of mobiles that can be
supported on the forward and reverse links of a CDMA system is different. Reverse link capacity
improves with soft handoffs; however, soft handoffs affect the capacity of the forward link.
In a noise-limited system, cell size rather than capacity is the main concern. Receiver sen-
sitivity is used to calculate the size of the cell. In an interference-limited system, the size of the
cell is determined mainly by the level of the interference from other users.
The chapter includes several numerical examples to illustrate the procedure and demon-
strate the importance of several system parameters in capacity calculations. It concludes with
link safety margin parameters for the forward link channels.
13.11 References
1. Borth, D. E., and Pursley, M. B., “Analysis of Direct Sequence Spread Spectrum Multiple
Access Communication over Rician Fading Channels,” IEEE Transactions on Communica-
tions COM-27 (10), October 1979, pp. 1566–77.
2. Gilhousen, K., Jacobs, I., Padovani, R., Viterbi, A., Weaver, L., and Whearley, C., III, “On
the Capacity of a Cellular CDMA System,” IEEE Transactions on Vehicular Technology 40
(2), May 1991, pp. 303–12.
3. Gilhousen, K. S., Jacobs, I. M., Padovani, R., and Weaver, L. A., “Increased Capacity Using
Satellite Communications,” IEEE Transactions on Select Areas in Communications JSAC-8
(4), May 1990, pp. 503–14.
4. Glisic, S., and Vucctic, B., Spread Spectrum CDMA Systems for Wireless Communications,
Artech House, Inc., Boston, 1997.
5. Viterbi, A. J., CDMA, Addison-Wesley Publishing Company, New York, 1995.
6. Viterbi, A. M., and Viterbi, A. J., “Erlang Capacity of a Power Controlled CDMA System,”
IEEE Journal of Selected Areas in Communications 11 (6), 1993, pp. 892–900.
7. Weber, C. L., et al., “Performance Considerations of CDMA Systems,” IEEE Transactions
on Vehicular Technology, February 1981, pp. 3–9.
312 Ch. 13 • Reverse and Forward Link Capacity of IS-95 CDMA System
13.12 Problems
1. A chip rate of 1.2288 Mcps is used for IS-95 RS2 (14.4 kbps with a 13-kbps vocoder).
The required Eb /It is 7 dB. Calculate the average number of mobiles supported by a sec-
tor of the three-sector cell; also calculate the Erlang capacity of a sector at 2% block-
ing. Assume: interference from other cells f = 0.6; cell loading ρ = 0.6; voice activity
factor vf = 0.4; power control accuracy factor ηc = 0.90; gain due to sectorization α =
2.61.
2. Calculate the pole capacity of the IS-95 CDMA system with a chip rate of 1.2288 Mcps
and RS2 (14.4 kbps). Assume: interference factor due to neighboring cells f = 0.67;
voice activity factor vf = 0.6; power control accuracy factor ηc = 0.80; gain due to three-
sector antenna α = 2.55.
3. A total of 20 equal-power mobiles share a frequency band through a CDMA system.
Each mobile transmits data at 16 kbps with a DSSS BPSK-modulated signal. Calculate
the minimum chip rate of the PN sequence in order to maintain a bit error probability of
10–6. Assume: interference factor due to other cells f = 0.6; power control accuracy fac-
tor ηc = 0.8; gain due to three-sector antenna α = 2.55.
4. Calculate the Erlang capacity of a sector for the three-sector cell and the number of
users per sector using the following parameters: carrier bandwidth = 1.23 MHz, RS1,
R = 9.6 kbps; (Eb /It )min = 7 dB; voice activity factor vf = 0.5; interference due to other
cells f = 0.67; cell loading factor ρ = 0.5; call blocking probability, Pout = 1%; three-
sector antenna gain α = 2.55; 1/η = 10; standard deviation of power control σc = 2 dB.
5. Calculate total transmission loss in dB for the forward link of a CDMA system using
the following data:
◆ Cell output power = 40 dBm
◆ Allocated power for pilot channel = 15% of cell output
◆ Mobile noise figure = 8 dB
◆ (Ec /It )min = –13 dB
◆ Ioc /Io = 2.5 dB
6. Calculate total transmission loss in dB for the reverse link of a CDMA system using the
following data:
◆ Mobile output = 200 mW (23 dBM)
◆ (Eb /It ) = 7 dB
◆ Cell noise figure = 5 dB
◆ Cell loading ρ = 60%
7. Using the data given in Problems 5 and 6, find the allocated power of the pilot channel
for balancing the forward and reverse links.
C H A P T E R 1 4
Wireless Data
14.1 Introduction
This chapter covers data communication services and OSI upper layers and presents wireless
data systems including wide-area systems and high-speed Wireless Local Area Networks
(WLANs). We describe activities for wireless data standards and outline the error-control meth-
ods used by the standards. Also included are packet radio protocols and their channel efficiency
formulas. The contention function of packet radio models the mechanism where mobile stations
access the network on the access channel. Packet services are one of four data services sup-
ported in CDMA. The other three are asynchronous data, facsimile, and short message services
(similar to paging).
We discuss the standards for data services supported by CDMA cellular/PCS systems and
present highlights of the TIA IS-99, TIA IS-637, and TIA IS-657 standards. The chapter
includes the architecture for each of the four data services and the protocol stacks that are sup-
ported by the services.
We include both sets of standards (CDMA and non-CDMA) for two reasons: first, the
WLANs all use some form of spread spectrum communications, either frequency hopping or
direct sequence spreading; second, the two methods (WLANs and CDMA) are part of a larger
wireless network that many companies are constructing. With the phenomenal growth of laptop
personal computers and the Internet, wireless data is no longer limited to just e-mail or faxes. It
encompasses the ability to send and receive data any time from any place in the world. It gives a
user at a remote location full access to all of the desktop services that would normally be avail-
able at an office PC. Data services are delivering the same promise that voice services have
recently delivered: any time, any where communications.
313
314 Ch. 14 • Wireless Data
In circuit switching, the switch connects transmission paths to establish a circuit between
the transmitter and receiver. Circuit switching is quite suitable for continuous data transmission
services.
OSI Upper Layers 315
A packet-switched network uses another scheme. The nodes of the network, packet-
switching nodes, play a role similar to that of switches in a circuit-switched network. Packet-
switched networks can use two different methods for selecting the path followed by packets:
virtual circuit (VC) and datagram. In the VC transport, the different packets that are part of
the same information transfer are sent along the same path. The packets follow one another as
if they were using a dedicated circuit even though they may be interleaved with other packet
streams. Some implementations of VC perform an error control on each link between succes-
sive nodes. Thus, not only are the packets delivered in sequence by each node to the next
node along the path, but they are also transmitted without errors. This is implemented by each
node checking the correctness of the packets it receives and asking the previous node along
the path to retransmit incorrect packets. VC packet switching does not need a buffer at the
destination.
Since multiple virtual circuits may exist between the source-destination pair, routing can-
not be done on the basis of source-destination address only. Data packets must carry an indica-
tion of VC identification as well. Routing is done based on explicit route number and destination
address. An explicit routing table at each node associates an appropriate outgoing transmission
group with the destination address and explicit route number. Changing the explicit route num-
ber for a given destination will cause a new path to be followed. This introduces alternative route
capability. If a link or node along the path becomes inoperative, any session using that path can
be reestablished on an explicit route by bypassing the failed element. Explicit routes can also be
assigned on the basis of type of traffic, type of physical media along the path (satellite or terres-
trial, for example), or other criteria. Routes could also be listed on the basis of cost, the lowest-
cost route being assigned first, then the next-lowest-cost route, and so forth.
In datagram packet switching, the bits are grouped as packets. Each packet is labeled with
the address of its destination. The packets are routed independently of one another and arrive at
destination out of sequence. Datagram packet switching requires buffers at the source and the
destination. In datagram packet switching networks, each network node keeps a complete (glo-
bal) topological database that is updated regularly as topological changes occur. Generally, the
routing philosophy of datagram networks is to route packets (datagram) along paths of minimum
time delay.
The session layer sets up the call and takes care of the authentication of the user and of
billing. The session layer supervises the synchronization (packet numbering) and the recovery in
case of failures. It also closes the session at the end of the transmission.
The presentation layer asks the session layer to set up a call. It specifies the destination’s
name and the type of transmission (e.g., datagram, high priority). The presentation layer trans-
lates between the local syntax used by the application process and the transfer syntax, as well as
performing the required encryption and data compression.
The application layer provides information transfer services for user application pro-
grams. The user interacts with the application layer through a user interface. The application
layer is composed of Specific Application Service Elements (SASEs) that use the services of
Common Application Service Elements (CASEs). A CASE establishes the association between
SASEs and may include an Association Control Service Element (ACSE), a Remote Operation
Service Element (ROSE), and a Commitment Concurrency and Recovery (CCR) element.
RAM Mobile
(Mobitex) ARDIS (KDT) Metricom (MDN) CDPD
Data rate 19.2 kbps 19.2 kbps 76 kbps 19.2 kbps
Channel spacing 12.5 kHz 25 kHz 160 kHz 30 kHz
Access slotted ALOHA FHSS (ISM) unused AMPS
CSMA channels
Frequency (MHz) fc ~ 900 fc ~ 800 fc ~ 915 fc ~ 800
Transmit power (W) 0.16 to 10 under 40 1 1.6
power control
Modulation GMSKa GMSK GMSK GMSK BTb = 0.5
a
GMSK = Gaussian minimum shift keying.
b
BT = channel width × bit duration.
The CDPD technology shares the 30-kHz spaced 800-MHz voice channels used by the
AMPS systems. The data rate is 19.2 kbps. The CDPD base station equipment shares cell sites
with the voice cellular radio system. The aim is to reduce the cost of providing packet data service
by sharing the resources with voice cellular systems. This strategy is similar to one that has been
used by nationwide fixed wireline packet data networks to provide an economically viable data
service by using a small portion of the capacity of the networks designed mainly for voice traffic.
Another approach used in wide-area wireless packet data networks is based on the micro-
cell concept of providing coverage in smaller areas. The microcell data networks are designed
for stationary or low-speed users. The basic aim is to reduce the cost of providing wireless data
service by using small and inexpensive base stations that can be installed on utility poles, the
sides of buildings, and inside buildings. The strategy is similar to the one being proposed for
Personal Communications Networks (PCNs). BS-to-BS wireless links are used to reduce the
cost of interconnecting in a data network. A large microcell network of small, inexpensive base
stations has been installed in the lower San Francisco Bay area by Metricom. The slow Fre-
quency Hopping Spread Spectrum (FHSS) in the 902–928 MHz U.S. Industrial Scientific Medi-
cal (ISM) band has been used. Transmitter power is 1 W maximum. Power control is used to
minimize interference and maximize battery life.
Wide-Area Networks (WANs) and Metropolitan Area Networks (MANs). In the wide area, the
network transmission systems use the cellular arrangement and the wired long-distance network.
The data is packetized to meet the immediate demands of the users’ community. Data must be in
a proper form and format to prevent excessive overhead and consequent latency in transport. The
second approach deals with localized communications services for the added convenience of
connections between building floors and desktops in a dynamic environment. Flexibility to pro-
vide quick connections for moves, additions, and changes gives the organization significant
improvement over the basic wired LAN. The third approach is the flexible mobile LAN arrange-
ment to access a company intranet. This form of connectivity is becoming important in all walks
of life and business communities. As the workforce becomes more mobile, the need to provide
untethered connectivity is increasing exponentially.
Two different technical approaches exist with the WLANs. These are based on radio and
optical technologies. In the radio-based technology, there are two solutions: the licensed micro-
wave radio frequency range (18–23 GHz) or the unlicensed radio frequency range (902–928
MHz, 2.4–2.4835 GHz, and 5.75–5.825 GHz). In the unlicensed radio frequency, there are two
options. The first option uses Frequency Hopping Spread Spectrum (FHSS) technology,
whereas the second option uses Direct Sequence Spread Spectrum (DSSS) technology. The
902–928 MHz frequency band is an unlicensed ISM band that allows manufacturers to supply
products with very limited constraints. Newer products are also emerging that use the 2.4-GHz
band. The following are the major limitations of the unlicensed frequency-band WLANs:
• The system is restricted to 100 mW of output.
• The system must not interfere with other radio-frequency equipment in the same area.
• The system must go through an FCC-type acceptance process (in the international sec-
tor, this is called homologation or type acceptance, and the frequencies may be differ-
ent) using either 902–928 MHz, 2.4–2.4835 GHz, or 5.75–5.825GHz frequencies in
various ISM bands.
Table 14-2 provides a partial list of WLANs available in the United States, two of which
we will describe briefly—AT&T WaveLAN, based on the FHSS technology, and Telesystem
ARLAN, based on the DSSS technology [1].
• AT&T WaveLAN. This system supports speeds of up to 20 Mbps and works with var-
ious network operating systems. WaveLAN uses a DS Quadrature Phase Shift Keying
(QPSK) multiplexing scheme to transmit across the entire broadband at higher signal
rates. Through multiplication of the original narrowband signal with PN sequence, the
code is spread across several frequencies. WaveLAN offers better security because the
conventional radio receiver cannot decode the signal without knowing the actual
spreading pattern. WaveLAN can operate up to 800 feet with a power output of 250
mW. It works in any laptop, notebook, or palmtop PC that is equipped for a Personal
Computer Memory Card International Association (PCMCIA) card. WaveLAN allows
users to operate in a cellular network for LANs. Each WaveLAN is assigned its own
identification code and can receive data only if its code corresponds to that of the cell it
occupies. Users can move anywhere within their assigned cell and still be able to com-
municate intracell. If users need to move between cells, they must first stop the applica-
tion from running, then reconfigure their address ID to match with the cell they are
moving into. With roaming this is automatic. WaveLAN is capable of interfacing
directly with the backbone cable systems at standard LAN cable speeds.
• Telesystems Advanced Radio LAN (ARLAN). ARLAN uses DSSS technology.
Using a conventional cable system, ARLAN devices called access points are attached
to the cable to allow for a full range of interconnections. A microcell can be configured
from the backbone network by setting an access point to act like a wireless repeater.
Telesystems Micro-cellular Architecture (TMA) allows the network to cover various
applications and various-sized facilities. With multiple base station antennas, the net-
work can be extended to create microcells, each with its own operating area and
devices. TMA is supported by firmware in each of the ARLAN devices. It supports
multiple overlapping cells, creating a seamless network within the building. Handoff
from cell to cell is a part of the network concept that allows for LAN connectivity of
users who need to move freely throughout departments or floors within the building.
Using SS technology, the system can select various center frequencies and allows for
the coexistence of multiple devices operating within the same area but serving different
needs. ARLAN 600 was designed for high-noise, industrial applications and uses a
spreading ratio of up to 100. It offers a full range of interfaces for async and sync data
transfer from terminals and hosts. The system operates in the 915-MHz and 2.4-GHz
frequency ranges and uses packet burst duplex transmission capabilities. Access to the
ARLAN network is packet-switched Carrier-Sense Multiple Access with Collision
Avoidance (CSMA/CA) (see section 14.6.2.3 for details on CSMA). Power output for
these devices is up to 1 W for distances of up to 500 feet diameter in an office environ-
ment and up to 3000 feet diameter in factories or open-plan offices indoors. For line-of-
Table 14-2 Partial List of WLAN Products
320
No. of Chan. or Mod/ Power Network
Product Freq. Link Rate User Rate Protocol Access Spread Factor Coding (mW) Topol.
Altair Plus 18–19 15 Mbps 5.7 Mbps Ethernet 4-level 25 peak 8 devices per
Motorola GHz FSKa radio
WaveLAN 902–928 2 Mbps 1.6 Mbps Similar to DSSS DQPSKb 250 peer to peer
AT&T MHz Ethernet
AirLAN 902–928 2 Mbps Ethernet DSSS DQPSK 250 PCMCIA
Solectek MHz with antenna
Freeport 902–928 16 Mbps 5.7 Mbps Ethernet DSSS 32 chips per bit 16 PSKc/ 650 hub
Windata MHz Trellis
Intersect 902–928 2 Mbps Ethernet; DSSS DQPSK 250 hub
Persoft Inc. MHz Token-ring
LAWN 902–928 38.4 kbps AX.25 SS 20 users per channel; 20 peer to peer
O’Neill Comm. MHz max. 4 channels
WiLAN 902–928 20 Mbps 1.5 Mbps Ethernet; CDMA/ 3 channels; 10–15 Unconv. 30 peer to peer
WiLAN Inc MHz per channel Token-ring TDMA links each
Radio Port 902–928 242 kbps Ethernet SS 100 peer to peer
ALPS Electric MHz
ARLAN 600 902–928 1.35 Mbps Ethernet DSSS 100 PCs with
Telesys. 2.4 GHz Max. antennas
Radio Link 902–928 250 kbps 64 kbps FHSS 250 ms/hop hub
Cal. Microwave 2.4 GHz 500-kHz space
RangeLAN 902–928 242 kbps Ethernet; DSSS 3 channels 100
Proxim, Inc. MHz Token-ring
RangeLAN 2 2.4 GHz 1.6 Mbps 50 kbps Ethernet; FHSS 10 channels @ 5kbs; 100 peer to peer
Proxim Inc. Token-ring 15 subchannels each bridge
Netwave 2.4 GHz 1 Mbps per Ethernet; FHSS 82 1-MHz channel or hub
provide slow frequency hopping in which each packet is sent in one hop and, if it is destroyed,
the following packet is sent from another hop for which the channel condition would be different.
This approach provides a very effective time-frequency diversity and takes advantage of a
retransmission scheme to provide a robust transmission. The IEEE 802.11 standard avoids rigid
requirements and leaves room for vendors to maneuver in the following areas:
1. Multiple physical media—FHSS and DSSS radio, as well as infrared light; additional
media as approved in the future.
2. Common MAC layer regardless of physical layer—all IEEE 802.11-compliant
WLANs use CSMA/CA algorithm similar to Ethernet’s Carrier-Sense Multiple Access
with Collision Detection (CSMA/CD) MAC layer.
3. Common frame format—frames including headers and error protection fields are the
same, regardless of whether the attached wired LAN is 802.3 Ethernet or 802.5 token
ring; the access point handles conversion of 802.11 frames to wireline frame format.
4. Multiple on-air data rates—1 or 2 Mbps, with the possibility of higher rates in the
future.
5. Power limit—a maximum power of 1 W (or +30 dBm), as mandated by the FCC; there
is no minimum power requirement, which leaves open the possibility of low-power
implementations.
The standard defines the basic media and configuration issues, transmission procedures,
throughput requirements, and range characteristics for WLAN technology, focusing more on
access applications that involve the use of personal digital assistants (PDAs) and portable PCs
rather than trunk applications (see Figs. 14-1 and 14-2). Trunk applications use wireless as part
of the enterprise backbone for transmitting data from building to building, whereas access appli-
cations allow users of portable PCs, PDAs, and other wireless devices to tap into corporate
LANs from anywhere in an office or on a factory floor.
The radio transmitter in each user end-station is always listening for activity on the
WLAN. If one end-station is transmitting, another will not. The system has a preset time-out to
block a user from dominating the network, to avoid unnecessary transmission collisions, and to
allow priority traffic through. This is the function of the CSMA/CA access control mechanism.
Once it is determined that the network is free, the end-station ramps up to full power and sends a
preamble (a standard signaling message) to the access point. The preamble is a repeated bit pat-
tern followed by a special bit sequence. It allows the access point to lock onto the signal before
the data is sent. After the link is established, the end-station sends address and protocol informa-
tion. The header is followed by the data, which is transmitted at the on-air data rate. After the
error-check word is sent, the end-station listens for acknowledgment from the destination. If no
acknowledgment is received, the data is re-sent. The sequence is repeated until all the data has
been sent and acknowledged.
The IEEE 802.11 committee has specified that data rates for wireless systems must be
either 1 or 2 Mbps. Either the user chooses the rate, or the system selects the best one according
to the conditions. The on-air data rate includes message headers, retransmissions, and latency
WLAN Standards 323
N
LA
ding
ARLAN 670
B uil
ARLAN 610
ARLAN 655
ARLAN 610
Wireless
Repeater
PCMCIA
LAN
lding
Bui
ARLAN 670
ARLAN 620
ARLAN 670
AN
gL
ldin
Bui
Figure 14-2 Access Application for WLAN between Two Buildings with Line of Sight
324 Ch. 14 • Wireless Data
(the time between when a network station begins to seek access to a transmission channel and
when that access is granted). Header overhead and retransmissions primarily affect performance
of large data transfers, whereas latency has the greatest effect on short, bursty data transfers; this
is because the latency involved in setting up a transmission introduces more delay than the trans-
mission of message overhead or the retransmissions. Therefore, throughput on a WLAN is lower
for short messages than for longer messages. The actual throughput of an IEEE 802.11 system
on an on-air data rate of 2 Mbps is about 1.0–1.5 Mbps for long messages and 0.5–1.0 Mbps for
short messages. Throughput is also affected by the range of the system. In a typical office envi-
ronment, the range of an IEEE 802.11 WLAN is 200–300 feet, which is sufficient to cover most
partitioned areas and an outside rim of walled offices.
Sensitivity of the system is crucial because signal power can be affected drastically by
obstacles. Sensitivity figures are the smallest amounts of received power that the radio can use.
The IEEE 802.11 standard requires a sensitivity of less than –80 dBm. One issue that is not
addressed by the standard is roaming capability. Roaming is made possible with overlapping
WLAN cells in a configuration similar to that used for analog cellular phones. Roaming is con-
sidered to be part of the application- or driver-level technology, so vendors will likely resort to
different schemes to achieve it.
this rate and range, a data rate of 500–1000 Mbps—comparable to FDDI—can be achieved for a
standard building floor of approximately 1000 m square. RES 10 is responsible for defining a
radio transmission technique, including type of modulation, coding, and channel access, as well
as the specific protocols.
Gp 1 1
M = ---------------- × ------------ × η c × ----- × α (14.1)
Eb ⁄ N 0 1+ f vf
EXAMPLE 14.1
Consider a CDMA system that uses QPSK modulation and convolutional coding. The system has a
bandwidth of 1.25 MHz and transmits data at 9.6 kbps. Find the number of users that can be sup-
ported by the system and the bandwidth efficiency. Assume a three-sector antenna with an effective
gain = 2.6, ηc = 0.9, and an interference factor f = 0.5. A BER of 10–3 is required.
6
1.25 × 10
G p = ------------------------
3
- = 130.2
9.6 × 10
326 Ch. 14 • Wireless Data
–3 1 E
P b = 10 = --- erfc -----b-
2 N0
E
-----b- ≈ 7 dB (5)
N0
130.2 1
M = ------------- × ---------------- × 2.6 × 0.9 = 40.6 ≈ 40
5 1 + 0.5
40 × 9.6
η bw = ------------------------3- = 0.307 bit/sec/Hz
1.25 × 10
EXAMPLE 14.2
Consider a QPSK/DSSS WLAN that is designed to transmit in the 902–928 MHz ISM band. The
symbol transmission rate is 0.1 mega symbols per second (Msps). An orthogonal code with 4 sym-
bols is used. A BER of 10–5 is required. How many users can be supported by the WLAN? A three-
sector antenna with a gain = 2.6 is used. Assume an interference factor f = 0.5 to account for the
interference from users in other cells and ηc = 0.9. What is the bandwidth efficiency of the system?
Band width Bw = 928–902 = 26 MHz
2
Data rate R = R s log 24 = 0.1 log 22 = 0.2 Mbps
B 26
G p = -----w- = ------- = 130
R 0.2
–5 1 E
P b = 10 = --- erfc -----b-
2 N0
E
-----b- ≈ 10 dB (10)
N0
130 1
M = --------- × ---------------- × 2.6 × 0.9 = 20.3 ≈ 20
10 1 + 0.5
20 × 0.2
η bw = ------------------- = 0.154 bit/sec/Hz
26
short messages. Random-access protocols provide flexible and efficient methods for managing
channel access when transmitting short messages. Random-access methods give each user free-
dom to gain access to the network whenever the user has information to send. Because of this
freedom, these schemes result in contention among users trying to access the network simulta-
neously. Contention may cause collisions resulting in the need to retransmit the information.
The commonly used random-access protocols are pure ALOHA, slotted ALOHA, and CSMA/
CD. The following sections briefly describe details of each of these protocols and provide nec-
essary throughput expressions.
* Note that the protocol on CDMA access channels as implemented in TIA IS-95A is based upon the pure ALOHA
approach. The mobile station randomizes its attempt for sending a message on the access channel and may retry if an
acknowledgment is not received from the base station. For further details, reference Section 6.6.3.1.1.1 of TIA IS-95A.
328 Ch. 14 • Wireless Data
– aG
aGe
S = ----------------------------
– aG
- (14.5)
1–e +a
• Unslotted 1-persistent CSMA
– G ( 1 + 2a )
G [ 1 + G + aG ( 1 + G + ( aG ) ⁄ 2 ) ]e
S = --------------------------------------------------------------------------------------------------------
– aG –G ( 1 + a )
- (14.6)
G ( 1 + 2a ) – ( 1 – e ) + ( 1 + aG )e
• Slotted 1-persistent CSMA
–G ( 1 + a ) – aG
Ge [1 + a – e ]
S = -----------------------------------------------------------------------
– aG –G ( 1 + a )
- (14.7)
( 1 + a ) ( 1 – e ) + ae
where S = normalized throughput,
G = normalized offered traffic load,
τ
a = ------ ,
Tp
τ = propagation delay, and
Tp = packet transmission time.
EXAMPLE 14.3
Consider a WLAN installation in which the maximum propagation delay is 0.4 µsec. The WLAN
operates at a data rate of 10 Mbps, and packets have 400 bits. Calculate the throughput with: (1) an
unslotted nonpersistent, (2) a slotted persistent, and (3) a slotted 1-persistent CSMA protocol.
400
T p = --------- = 40 µsec
10
τ 0.4
a = ------ = ------- = 0.01
Tp 40
–6 6
40 × 10 × 10 × 10
G = ------------------------------------------------- = 1
400
• Unslotted nonpersistent
– 0.01
1×e
S = ------------------------------------------
– 0.01
- = 0.493
( 1 + 0.02 ) + e
• Slotted nonpersistent
– 0.01
0.01 × 1e
S = -------------------------------------
– 0.01
= 0.496
1–e + 0.01
• Slotted 1-persistent
– 1.01 – 0.01
e ( 1 + 0.01 – e )
S = -------------------------------------------------------------------------------
– 0.01 – 1.01
- = 0.531
( 1 + 0.01 ) ( 1 – e ) + 0.01e
330 Ch. 14 • Wireless Data
• Stop and Wait. The sender transmits the first packet numbered 0 after storing a copy of
that packet. The sender then waits for an ACK numbered 0 (ACK0) of that packet. If
the ACK0 does not arrive before a time-out, the sender makes another copy of the first
packet, also numbered 0, and transmits it. If the ACK0 arrives before a time-out, the
sender discards the copy of the first packet and is ready to transmit the next packet,
which it numbers 1. The sender repeats the previous steps, with numbers 0 and 1 inter-
changed. The advantages of the Stop and Wait protocol are its simplicity and its small
buffer requirements. The sender needs to keep only a copy of the last packet transmit-
ted, and the receiver does not need to buffer packets at the data link layer. The main dis-
advantage of the Stop and Wait protocol is that it does not use the communication link
very efficiently and it is slow.
The total time taken to transmit a packet and to prepare for transmitting the next
one is
T
η ( 0 ) = -----p- (14.9)
T
( 1 – p )T p
η FD = ------------------------------------
- (14.10)
( 1 – p )T + pT p
Error Control Schemes 331
( 1 – p )T
η HD = -----------------------p (14.11)
T
• Selective Repeat Protocol (SRP). The data link layer in the receiver delivers exactly
one copy of every packet in the correct order. The data link layer in the receiver may get
the packets in the wrong order from the physical layer. This occurs, for example, when
transmission errors corrupt the first packet and not the second one. The second packet
arrives correctly at the receiver before the first packet gets there. The data link layer in
the receiver uses a buffer to store the packets that arrive out of order. Once the data link
layer in the receiver has a consecutive group of packets in its buffer, it can deliver them
to the network layer. The sender also uses a buffer to store copies of the unacknowl-
edged packets. The number of the packets that can be held in the sender/receiver buffer
is a design parameter. Let W = the number of packets that the sender and receiver buff-
ers can each hold and SRP = number of packets modulo-2 W. The protocol efficiency
without any error and with an error probability of p is given as
WT p
η ( 0 ) = min -----------, 1 (14.12)
T
For very large W, the protocol efficiency is
η( p) = 1 – p (14.13)
where T = time-out = WTp
2 + p(W – 1)
η ( p ) = ----------------------------------- (14.14)
2 + p ( 3W – 1 )
SRP is very efficient, but it requires buffering packets at both the sender and the
receiver.
• Go-Back-N (GBN). The Go-Back-N protocol allows the sender to have multiple unac-
knowledged packets without the receiver having to store packets. This is done by not
allowing the receiver to accept packets that are out of order. When a time-out timer
expires for a packet, the transmitter resends that packet and all subsequent packets. The
Go-Back-N protocol improves on the efficiency of the Stop and Wait protocol, but is
less efficient than SRP. The protocol efficiency is given as
1
η FD = ---------------------------------
(14.15)
1 + ------------ W
p
1 – p
do not operate well in a digital cellular system. WORM ARQ has been suggested for
control of dynamic error characteristics. It is a hybrid scheme that combines SRP with
GBN. GBN protocol is chosen in severe error conditions, whereas SRP is selected in
normal error conditions.
• Variable Window and Frame Size GBN and SRP. Since CDMA systems have bursty
error characteristics, the error control schemes should have a dynamic adaptation to a
bursty channel environment. SRP and GBN with variable window and frame size have
been proposed in [22] to improve error control in CDMA systems. Table 14-3 provides
the window and frame sizes for different bit error rates. If the error rate increases, the
window and frame size are decreased. If the error rate is small, the window and frame
size are increased. The optimum threshold values of BER and window and frame size
were obtained through computer simulation.
In CDMA systems, the forward link consists of pilot, sync, paging, and traffic channels.
System information sent on the sync and paging channels allows each mobile station to evaluate
the BER easily by measuring the ratio of the number of retransmitted frames to the number of
transmitted frames over a 2-second period. Thus, the mobile station can change the window and
frame sizes according to the BER.
Table 14-3 Bit Error Rate vs. Window and Frame Size
EXAMPLE 14.4
Consider a WLAN in which the maximum propagation delay is 4 µsec. The WLAN operates at a data
rate of 10 Mbps. The data and ACK packet are of 400 and 20 bits, respectively. The processing time
for a data or ACK packet is 1 µsec. If the probability p = 0.01 that a data packet or its ACK can be
corrupted during transmission, find the data link protocol efficiency with (1) Stop and Wait protocol,
full duplex, (2) SRP with window size W = 8, and (3) Go-Back-N protocol with window size W = 8.
400
T p = --------- = 40 µsec
10
20
T a = ------ = 2 µsec
10
T prop = 4 µsec
T proc = 1 µsec
Data Services in IS-95 333
T = 40 + 2 × 4 + 2 × 1 + 2 = 52 µsec
Stop and Wait:
( 1 – 0.01 ) × 40
η = ------------------------------------ = 0.762
52
SRP:
2 + 0.01 ( 8 – 1 )
η = ---------------------------------------- = 0.954
2 + 0.01 ( 24 – 1 )
Go-Back-N:
1
η = ------------------------------------- = 0.925
1 + 8 -------------------
0.01
1 – 0.01
continue using its existing radios, backhaul facilities, infrastructure, and handsets while merely
implementing a software upgrade with an IWF.
TIA IS-95B allows for code or channel aggregation to provide data rates of 64–115 kbps,
as well as offering improvements in soft handoffs and interfrequency hard handoffs. To achieve a
114-kbps rate, up to eight CDMA traffic channels, each offering 14.4 kbps, are needed to be
aggregated.
TCP ICMP
IP
PPP
RLP
IS-95A
TCP: Transmission Control Protocol
ICMP: Internet Control Message Protocol
IP: Internet Protocol
SNDCF: Subnetwork Dependent Convergence Function
IPCP: Internet Protocol Control Protocol
LCP: Link Control Protocol
PPP: Point-to-Point Protocol
RLP: Radio Link Protocol
The Radio Link Protocol (RLP) employs ARQ, Forward Error Correction (FEC), and flow
control. Flow control and retransmission of data blocks with errors are used to provide improved
performance in the mobile segment of the data connection at the expense of variations in
throughput and delay. Typical raw channel data error rates for cellular transmission are approxi-
mately 10–2. However, an acceptable data transmission usually requires a BER of about 10–6. In
order to achieve this, it requires the design of efficient ARQ and error correction codes to deal
with error characteristics in the mobile environment.
The CDMA protocol stack for data and facsimile (Figure 14-3) has the following layers:
• Application Interface Layer. This layer includes an application interface between the
data source/destination in the mobile terminal (MT0) or terminal equipment (TE2) and
the transport protocol layer. In the base station, the application interface resides
between the data source/destination on the network (Ai interface) side and the transport
protocol layer. The application interface provides: modem control, AT command pro-
cessing,* negotiation of air interface data compression, and data compression over the
air interface (optional).
• Transport Layer. The transport layer for CDMA asynchronous data and fax services is
based on Internet transport layer protocol known as Transmission Control Protocol
(TCP) [7]. The implementation complies with the requirements for TCP with modifica-
tions as described in IS-95 [14]. If the modified procedure is disabled, there is no max-
imum number of retransmission attempts during synchronization, and an established
TCP connection remains open until explicitly closed by the mobile station or base sta-
tion. The application interface sets the value of R2 in the protocol. The base station fol-
lows either the procedure of the Internet Control Message Protocol (ICMP) [6] or the
procedure given above for TCP.
• Network Layer. The network layer for CDMA async data and fax services is based on
Internet network layer protocol known as the Internet Protocol (IP) [5]. The network
layer includes the ICMP [6]. The implementation complies with the requirements of
the IP [5] and requirements for Internet hosts [8] with modifications as described in IS-
95 [14]. The interface between the network and transport layer complies with the
requirements of the ICMP.
• Sub-Network Dependent Convergence Function (SNDCF). The SNDCF performs
header compression on the headers of the transport and network layers. This function is
negotiated using Point-to-Point Protocol (PPP) and Internet Protocol Control Protocol
(IPCP) [10]. Mobile stations support Van Jacobson TCP/IP header compression. A min-
imum of one compression slot is negotiated. Base stations support TCP/IP header com-
pression compatible with that required for mobile stations. Negotiation of the
* The AT commands were originally defined by Hayes Microcomputer Company for its wireline modems. The com-
mand set has now been adopted by most wireline and wireless modems. The name AT is derived from the use of an
“AT” to preface all commands to the modem.
336 Ch. 14 • Wireless Data
parameters of header compression is carried out using IPCP. The SNDCF sublayer
accepts the network-layer datagram from the network layer, performs header compres-
sion as required, and passes the datagram to the PPP layer, indicating the appropriate
PPP protocol identifier. The SNDCF sublayer receives network-layer datagrams with
compressed or uncompressed headers from the PPP layer, decompresses the datagram
header as necessary, and passes the datagram to the network layer.
• Data Link Layer. This layer uses PPP [11]. The PPP Link Control Protocol (LCP) is
used for initial link establishment and for the negotiation of optional link capabilities.
The data link layer uses the PPP IPCP to negotiate IP addresses and TCP/IP header
compression. The data link layer accepts network-layer datagrams from the SNDCF
and encapsulates them in the PPP information field. The packet is framed using the
octet synchronous framing protocol, except that there is no interframe fill. No flag
octets are sent between a flag octet that ends one PPP frame and the flag octet that
begins the subsequent PPP frame. The framed PPP packets are passed to the RLP layer
for transmission. The data link layer accepts received octets from the RLP layer and
reassembles the original PPP packets. The PPP process discards any PPP packet for
which the received Frame Check Sequence (FCS) is not equal to the computed value.
• Internet Protocol Control Protocol Sublayer. This sublayer supports negotiation of
the IP-address (type = 3) and IP-compression (type = 2) protocol parameters. IPCP
negotiates a temporary IP address for the mobile station whenever a transport layer
connection is actively opened. Mobile stations maintain the temporary IP address only
while a transport layer connection is open or being opened, and discards the temporary
IP address when the transport layer connection is closed.
• Link Control Protocol. If the protocol identifier is 0xC021, the PPP layer processes
the packet according to PPP LCP. For other supported protocol identifiers, the PPP
layer removes the PPP encapsulation and passes the datagram and protocol identifier to
the SNDCF. For unsupported protocol identifiers, the LCP Protocol-Reject is passed to
the RLP layer for transmission. The mobile station supports the PPP LCP Configure-
Request, Configure-ACK, Configure-Negative Acknowledgment (NAK), Configure-
Reject, Terminate-Request, Terminate-ACK, Code-Reject, and Protocol-Reject. Other
LCP packet types may also be supported. The PPP LCP negotiates the following con-
figuration options:
1. Async control character map: The mobile station does not require any mapping
of control characters. The base station may negotiate mapping of control charac-
ters.
2. Protocol field compression: this applies when the protocol number is less than
0xFF.
3. Address and control field compression: this applies when the protocol number is
not 0xC021.
Asynchronous Data and Group-3 Facsimile 337
The mobile station may also support other configuration options (such as maxi-
mum receive unit, authentication protocol, link quality protocol, or magic number).
When an option is received that is not supported, Configure-Reject is sent as an indica-
tion to the peer.
• Radio Link Protocol Layer. The RLP layer provides an octet stream service over the
forward and reverse traffic channels and substantially reduces the error rate typically
exhibited by these channels. This service is used to carry the variable-length data pack-
ets on the PPP layer. The RLP divides the PPP packets into TIA IS-95A traffic channel
frames for transmission. There is no direct relationship between PPP packets and traffic
channel frames. A large packet may span multiple traffic channel frames, or a single
traffic channel frame may contain all or part of several small PPP packets. The RLP is
unaware of higher-layer framing; it operates on a featureless octet stream, delivering
the octets in the order received from the PPP layer. For service options supporting an
interface with multiplex option 1, RLP frames may be transported as primary or sec-
ondary traffic or as signaling traffic via data burst messages. For the primary or second-
ary traffic, the RLP generates and supplies exactly one frame to the multiplex sublayer
every 20 ms. The frame contains the service option information bits. The multiplex
sublayer in the mobile station categorizes every received traffic frame and supplies the
frame type and accompanying bits, if any, to the RLP layer. The frame type and frame
category for primary and secondary traffic are given in Tables 14-4 and 14-5. A blank
frame is used for blank-and-burst transmission of signaling traffic.
The signaling subchannel may carry frames from multiple RLPs, with each RLP
having a distinct BURST_TYPE. Each service option defines a unique BURST_TYPE
used for RLP. The primary and secondary multiplex subchannels each carry at most a sin-
gle RLP layer. RLP data frames sent on one multiplex subchannel are not to be transmit-
ted on another subchannel. RLP frames are not sent on the access and paging channels.
• Radio Interface. The mobile station and base station support the physical layer, mul-
tiplex sublayer, radio link management, and call control as defined in TIA IS-95A.
They use service option 4 for async data services and service option 5 for Group-3 fax
services, but they do not transmit 1/4-rate frames when service option 4 or service
option 5 is active. Service options 4 and 5 support an interface with multiplex option 1.
RLP frames for service options 4 and 5 are transported only as primary traffic or signal-
ing traffic. The mobile station and the base station perform service option negotiation for
service options 4 and 5 as described in TIA IS-95A (sections 6.6.4.1.2 and 7.6.4.1.2).
Initialization and connection in the mobile station and the base station to accept service
option 4 or service option 5 in response to a Service Option Request order is performed
according to the specifications in TIA IS-99 (sections 3.8.4.1 and 3.8.4.2).
acknowledge the message. Optionally, the recipient can specify one of a number of predefined
messages to be returned with acknowledgment to the sender.
SMS administration features include message storage, profile editing, verification of
receipt, and status inquiry capabilities. The SMS transmission capabilities provide for the trans-
mission of short messages to or from an intended mobile station as well as return of acknowl-
edgments and error messages. These messages and acknowledgments are transmitted to or from
the mobile station whether it is idle or engaged in a voice or data call. The cellular service pro-
vider may offer SMS transmission to its cellular voice and data customers only or may provide
an SMS-only service without additional voice or data transmission capability. All available
mobile stations on a CDMA paging channel can receive a broadcast message. A broadcast mes-
sage is not acknowledged by the mobile station. Broadcast messaging services may be made
available to mobile stations on CDMA paging channels as well as to mobile stations in a call on
a CDMA traffic channel.
Fig. 14-4 shows the network reference model for SMS. The base station (BS) contains the
transceiver equipment, the MSC, and any IWF required for network connection. These elements
are grouped together because there is no need to distinguish them. The MC element in the model
represents a generic SMS MC function. The N reference point represents one or more standard-
ized interfaces between an SMS MC and a BS. The TE is voice or data equipment connected
either directly or indirectly to the MC. It is possible for the MC to be included in or co-located
with a BS. In this case, the N interface is internal to the BS.
Um Ai W
MS BS PSTN TE
MC TE
The SMS protocol stack for the CDMA mode of operation is shown in Fig. 14-5. The SMS
bearer service is the portion of the SMS system responsible for delivery of messages between
the MC and mobile user equipment. The bearer service is provided by the SMS transport and
relay layers.
The SMS transport layer is the highest layer of the bearer service protocol. The transport
layer manages the end-to-end delivery of messages. In an entity serving as a relay point, the
transport layer is responsible for receiving SMS transport layer messages from an underlying
SMS relay layer, interpreting the destination address and other routing information, and for-
warding the message via an underlying SMS relay layer. In entities serving as end points, the
transport layer provides the interface between the SMS bearer service and SMS teleservice.
SMS uses the following layers:
• SMS Relay Layer. The SMS relay layer provides the interface between the transport
layer and the link layer used to carry short message traffic. On the Um interface, the
SMS relay layer supports the SMS transport layer by providing the interface to the
TIA IS-95A transmission protocols required to carry SMS data between CDMA
mobile stations and the base stations. On the N interface, the SMS relay layer supports
the SMS transport layer by providing the interface to the network protocols required
to carry SMS data between the MC and TIA IS-95A base stations. The N reference
point is assumed to be an intersystem network link with connectivity to the MC. Inter-
system links can use a variety of public and private protocols. SMS protocols and mes-
sage formats on intersystem links may differ from those used on the CDMA air
interface. The N interface relay layer is responsible for formatting and parsing SMS
SMS Teleservice
Layer
SMS Transport
Layer
SMS Relay
Layer
Rm Um L Pi
• Mobile Terminal 0 (MT0). An MT0 is a self-contained mobile terminal that does not
support an external interface.
• Mobile Terminal 2 (MT2). An MT2 provides a non-ISDN (Rm ) user interface.
• Base Station (BS). A base station represents the equipment on the land side of the Um
interface, including radio processing and management and protocol processing and
management.
• Mobile Switching Center (MSC). The MSC represents the functions provided by the
cellular switch including circuit-switched call management, mobile location, and
mobile management.
• Interworking Function (IWF). An IWF provides functions needed for terminal equip-
ment connected to a mobile termination to interface with other networks such as PSTN
or CDPD network. A CDPD Mobile Data Intermediate System (MD-IS) is an example
of an IWF.
• Public Packet Data Network (PPDN). A public packet-switched data network (such
as the Internet) provides a transport mechanism for packet data between processing ele-
ments capable of using such service.
connection is between the TE2 and the IWF. The network layer includes protocols such as IP
and CLNP, and packet data network registration and authentication protocols such as MNRP
(see Fig. 14-7).
Mobile Station
Upper Upper
Protocol Protocol
Layers Layers
Network Network
Network Layer Layer
Layer Protocols Protocols
IP or CLNP IP or CLNP
Rm Um L
Mobile Station
Upper Upper
Protocol Protocol
Layer Layer
Rm Um L
virtual circuit for the mobile and the mobile is on a traffic channel with the packet
data service option connected.
2. Dormant: An open IWF link connection is dormant when there is no L interface
virtual circuit for the mobile and the mobile is not on a traffic channel with the
packet data service option connected.
The BS/MSC and IWF maintain the state of link layer connection. The mobile maintains
the state of PPP Link Control Protocol (LCP) and manages the IWF link layer connection using
LCP opening and closing procedures.
With IWF link layer connection in a dormant state, if either the mobile or BS/MSC has
data to send, it is not necessary to reopen the link layer connection or to reinitialize any upper
layer protocols, provided the packet data service type has not changed since the link layer last
entered the dormant state. The mobile and BS/MSC can freely mix packet data service requests
using any supported rate set within a service type.
Initialization/ Reconnect/
Traffic State Service option Service option Traffic State
connected
Connected connected
State
Traffic channel
initialized; negotiates
packet service option
Initialization/
Service option
connected
Service option
Connected disconnected
State
349
350 Ch. 14 • Wireless Data
layer connection enters the dormant state, subscriber call features that were deactivated
for packet data calls will be reactivated. Tones and announcements will be played for
the voice call. When a packet data call is established, subscriber call features that are
not supported for packet data calls will be deactivated, and tones and announcements
will be blocked.
• Simultaneous Voice and Data Support. This feature allows voice and packet data
traffic to be carried simultaneously within a single traffic channel. Subscribers must
have a mobile device that is capable of simultaneous voice and data service. Normal
voice calls are allowed and carried as primary traffic at any time, whether the mobile is
connected to a packet data call or not. If a new voice call is requested while the packet
data call is connected, the packet data call will be dropped first to start the voice call.
The packet data call will then be added using service negotiation procedures to provide
a service configuration containing voice as primary traffic and packet data as secondary
traffic. The transition of packet data from primary to secondary traffic may cause loss
of user data, but this will be detected and retransmitted as necessary by the upper layer
protocols without disruption to the user application. Thus, during a voice call, a link
layer connection may be opened and a packet data call established and data carried as
secondary traffic without disrupting the voice call. Both 9.6- and 14.4-kbps data rates
are supported for this feature.
• Service Options 4103 and 15. Service option 4103 provides the standard Internet pro-
tocol packet-mode data services instead of the CDPD data service. Service option 4103
is for a data rate of 9.6 kbps, whereas service option 15 is for the same service at 14.4
kbps. Service options 4103 and 15 may be provided with or without mobility support.
Mobility management for service options 4103 and 15 will be based on mobile IP pro-
tocol. Service options 4103 and 15 without mobility is suitable for users requiring only
portable services (i.e., users not moving while a data application is running).
14.12 Summary
Since wireless data networks do not operate without interconnection to other networks, this
chapter covered a variety of wireless data systems including the wide-area wireless data sys-
tems, high-speed Wireless Local Area Networks (WLANs), and the specific systems supported
by CDMA. We examined the various standards being adopted by the IEEE, WINForum, ETSI
(in Europe), and ARPA for wireless LANs. Since packet networks are an important part of wire-
less networks, the chapter briefly listed the characteristics of the access methods in common use
and defined their throughput equations. The common packet protocols are ALOHA, slotted
ALOHA, and Carrier-Sense-Multiple Access (CSMA) ALOHA.
We then presented the methods used to control errors for wireless data systems and con-
cluded with the highlights of the TIA IS-99, TIA IS-637, and TIA IS-657 standards for CDMA
cellular systems. CDMA supports asynchronous data, facsimile, packet data, and short message
service (SMS) to end points in another wireless network or to the wireline network. We exam-
ined the reference models and protocol stacks for each of these data services.
352 Ch. 14 • Wireless Data
14.13 References
1. Bates, R. J., Wireless Networked Communication, McGraw-Hill, Inc., NewYork, 1994.
2. Habab, I. M., Kavehrad, M., and Sundberg, C. E. W., “ALOHA with Capture over Slow and
Fast Fading Radio Channels with Coding and Diversity,” IEEE Journal of Selected Areas of
Communications 6, 1988, pp. 79–88.
3. Hammond, J. L., and O’Reilly, J. P., Performance Analysis of Local Computer Networks,
Addison-Wesley Publishing Company, Reading, MA, 1986.
4. Pahlavan, K., and Levesque, A. H., Wireless Information Networks, John Wiley and Sons,
Inc., New York, 1995.
5. RFC 791, “Internet Protocol.”
6. RFC 792, “Internet Control Message Protocol.”
7. RFC 793, “Transmission Control Protocol.”
8. RFC 1122, “Requirements for Internet Hosts—Communication Layers.”
9. RFC 1144, “Compressing TCP/IP Headers for Low-Speed Serial Links.”
10. RFC 1332, “The PPP Internet Protocol Control Protocol (IPCP).”
11. RFC 1661, “The Point-to-Point Protocol (PPP).”
12. RFC 1700, “Assigned Numbers.”
13. Skalar, B., Digital Communications—Fundamentals and Applications, Prentice Hall, Engle-
wood Cliffs, NJ, 1988.
14. TIA IS-95A, “Mobile Station–Base Station Compatibility Standard for Dual-Mode Wide-
band Spread Spectrum Cellular System.”
15. TIA IS-99, “Data Services Option Standard for Wideband Spread Spectrum Digital Cellular
System.”
16. TIA 232E, “Interface between DTE and DCE Employing Serial Binary Data Interchange.”
17. TIA IS-637, “Short Message Services for Wideband Spread Spectrum Cellular Systems.”
18. TIA IS-657, “Packet Data Services Option for Wideband Spread Spectrum Cellular System.”
19. TIA IS-687, “Data Services Inter-Working Function Interface Standard for Wideband Spread
Spectrum Digital Cellular System.”
20. Viterbi, A. J., and Padovani, Roberto, “Implications of Mobile Cellular CDMA,” IEEE
Communication Magazine 30 (12), 1992, pp. 38–41.
21. Walrand, J., Communications Networks: A First Course, Irwin, Homewood, IL, 1991.
22. Woo, Ill, and Cho, Dong-Ho, “A Study on the Performance Improvements of Error Control
Schemes in Digital Cellular DS/CDMA Systems,” IEICE Trans. Communications E77-B
(7), July 1994.
C H A P T E R 1 5
cdma2000 System
15.1 Introduction
The International Telecommunications Union-Radio Communication (ITU-R) standardization
sector developed specifications for International Mobile Telecommunications—2000 (IMT-
2000). IMT-2000 has greatly expanded the range of service capabilities and covers a wide range
of environments. IMT-2000 [5] specifications are aimed to facilitate the introduction of new
capabilities and to provide a seamless evolution from the substantially installed second-genera-
tion (2G) telecommunications base by the year 2000+. The third-generation (3G) telecommuni-
cations systems based on IMT-2000 specifications will be introduced in service in the years
2000–2002. The 3G systems will offer a plethora of telecommunications services including
voice, low- and high-bit-rate data, multimedia, and video to mobile users via a range of mobile
terminals, operating in both public and private environments (office areas, residential areas,
transportation media, etc.).
The ITU World Administration Radio Conference in 1992 (WARC-92) identified 230
MHz in a 2-GHz band for use on a worldwide basis for the satellite and terrestrial components
of IMT-2000. The WARC-95 revised 2-GHz frequency allocations for mobile satellite services
(MSS) to provide a satellite component of IMT-2000 (see Fig. 15-1).
Table 15-1 provides a summary of the current IMT-2000 3G air interface proposals to ITU
and their network interfaces.
The cdma2000 Radio Transmission Technology (RTT) is a wideband, spread spectrum
radio interface that uses CDMA technology to satisfy the needs of 3G wireless communication
systems. This RTT meets all requirements specified in the ITU circular letter and the corre-
sponding documents of the IMT-2000. The service requirements are satisfied for indoor office,
indoor-to-outdoor/pedestrian, and vehicular environments. The cdma2000 system will also be
backward compatible with the current cdmaOne (IS-95) family of standards.
353
354
ITU IMT-2000
MSS MSS MSS MSS
1885 1980 2010 2025 2110 2160 2170 2200 MHz
Europe DECT
IMT- IMT-2000 MSS MSS IMT-2000 MSS
1880 1900 1980 2010 2025 2110 2170 2200 MHz
The cdma2000 system provides a wide range of implementation options to support data
rates (both circuit switched and packet switched) starting from the TIA IS-95B-compatible rate
of 9.6 kbps up to greater than 2 Mbps. The cdma2000 system provides maximum flexibility to
carriers in making engineering trade-offs between
• Channel sizes of 1, 3, 6, 9, and 12 × 1.25 MHz
• Support for advanced antenna technologies
• Cell sizes (e.g., the cdma2000 system’s increased performance can be realized in terms
of increased range to permit carriers to reduce the total number of cell sites)
• Higher data rates that can be supported in all channel sizes
• Support for advanced services possible or practical in other systems (e.g., high-speed
circuit data, B-ISDN, or H.224/223 teleservices)
The cdma2000 system can be operated economically in a wide range of environments,
including
• Outdoor megacells (cell >35 km radius)
• Outdoor macrocells (cell 1–35 km radius)
• Indoor/outdoor microcells (up to 1 km radius)
• Indoor/outdoor picocells (<50 m radius)
The cdma2000 system can be deployed in
• Indoor/outdoor environment
• Wireless local loop (WLL)
356 Ch. 15 • cdma2000 System
• Vehicular environment
• Mixed vehicular and indoor/outdoor environment
The cdma2000 system’s mobility is variable, ranging from fixed wireless to high speeds of
up to 300 mph. cdma2000 provides a layered structure to support the integration of the bottom
two layers of the RTT into systems that implement any network standards (e.g., ITU-T-defined
signaling services). It also provides backward compatibility to TIA IS-95B signaling and call
control models. An extended cdma2000 upper layer signaling structure is capable of supporting
a wide range of advanced services (e.g., multimedia) in an optimized and efficient manner.
cdma2000 supports the 3G wireless intelligent networking (WIN) services and services
defined by the ITU or other international standards organizations and provides a graceful evolu-
tion from existing 2G TIA IS-95B technology. It includes the following features:
• Support for overlay configurations
• Support for backward compatibility to TIA IS-95B signaling and network
• Support for graceful and gradual upgrade from 2G system to 3G system
• Sharing of common channels with an underlay TIA IS-95B system during transition
periods
cdma2000 provides an evolutionary path by reusing existing TIA IS-95B standards,
including
• TIA IS-95B: Mobile Station and Radio Interface Specifications
• IS-707: Data Services (Packet, Async, and Fax)
• IS-127: Enhanced Variable-Rate Codec (EVRC) 8.5-kbps speech coder
• IS-733: 13-kbps speech coder
• IS 637: Short Message Service (SMS)
• IS 638: Over-the-Air Activation and Parameter Administration (supporting the configu-
ration and service activation of mobile stations over the radio interface)
• IS-97 and IS-98 (Minimum Performance Specifications)
• The basic TIA IS-95B channel structure
• Extensions to TIA IS-95B Fundamental/supplemental channel structure, multiplex
layer, and signaling to support higher rate operation, common broadcast channels
(pilot, paging, and sync)
• IS-634A: no significant changes expected for cdma2000; the layered structure of
cdma2000 integrates smoothly with the component structure of IS-634A
• TIA IS-41D: No significant changes needed for cdma2000; the layered structure of
cdma2000 offers the potential for easy integration with enhanced network services (WIN)
IS-95 cdma2000 Other Signaling Packet Data Null Circuit Data LAC
Signaling Signaling Layer 2 Layer 2 Layer 2 Layer 2 Sub-
Layer 2 Layer 2 layer
PLICF for MAC Instance 1 PLICF for MAC Instance 2
OSI Link (e.g., Signaling) (e.g., Packet or Circuit Data Service)
Layer 2 Layer MAC
PLDCF Specific to Instance 1 PLDCF Specific to Instance 2 Sub-
layer
PLDCF MUX and QoS Sublayer
OSI Physical
cdma2000 Physical Layer
Layer 1 Layer
OSI Layers
(3–7)
Upper Layer Entities
LAC IS-95 Signaling cdma2000 Other Signaling Packet Data Null Circuit Data
Sublayer Layer 2 Signaling Layer 2 Layer 2 Layer 2 Layer 2
Layer 2 Link
Layer
(OSI 2)
LAC
Sublayer LAC Sublayer
The cdma2000 system includes a flexible and efficient MAC sublayer that supports multi-
ple instances of an advanced-state machine, one for each active packet or circuit data instance.
Together with the QoS control entity, the MAC sublayer realizes the complex multimedia, multi-
service capabilities of 3G wireless systems with QoS management capabilities for each active
service. The MAC sublayer provides three important functions:
• MAC control state. Procedures for controlling the access of data services (packet and
circuit) to the physical layer (including contention control between multiple services
from a single user as well as between competing users).
• Best-effort delivery. Reasonably reliable transmission over the radio link with radio
link protocol (RLP) providing a best-effort level of reliability.
cdma2000 Layering Structure 359
TIA/EIA-95B
MAC
Big Time-Out
Active Dormant
State State
Traffic
IS-95 3G
MAC
Time-Out Time-Out Time-Out
Active Control Suspended Dormant
State Hold State State State
Traffic Traffic
Traffic
Release
• Traffic, power control, • Power control & control • No dedicated channels • No dedicated channels
& control channels channels assigned • RLP & PPP state • No BS, MSC resources
assigned • Very fast traffic channel maintained • PPP state maintained
reassignment • Virtual active set • Small data bursts
• Slotted submode
Figure 15-5 Packet Data MAC Operation States in cdma2000 and TIA IS-95B
No data exchange
dtch is for more than Tactive;
Suspended State
established release is sent
dmch
Service option established
connected;
dmch_control
Not exchanging
Initialization State established Control Hold State data for more Not exchanging user data
than Thold for more than Tsuspend
PPP terminated;
Release message is sent;
Packet service Packet service release sent
PPP not terminated
request deactivated
Service option Dormant State
connected;
dmch_control established Has data to
Null State send
Reconnect State
PPP terminated;
Release sent dtch: dedicated traffic channel
dmch_control: dedicated MAC channel control
Note: Suspended state, dormant state, and reconnect state are applicable only to packet data services. PPP: point-to-point protocol
Traffic, power control, and control channels are assigned in the active state. In the control
hold state, a dedicated control channel is maintained between the user and the base station on
which any MAC control command (for example, the command to begin a high-speed data burst)
can be transmitted with virtually no latency. Power control is also maintained so that high-speed
burst operation can begin without any delay due to stabilization of power control.
In the suspended hold state, there are no dedicated channels maintained to or from the
user. However, the state information for RLP is maintained, and the base station and user main-
tain a virtual active set that allows either one to know which base station can best be used
(accessed by the user or paged by the base station) in the event that packet data traffic occurs for
the user. This state also supports a slotted substate that permits the user’s mobile device to pre-
serve power in a highly efficient manner.
A short data burst mode is added to the cdma2000 dormant state to support the delivery of
short messages without incurring the overhead of a transition from dormant to active state. Tran-
sitions between MAC states can be indicated by MAC control signaling or by the expiration of
timers. By properly selecting the values for the timers, the cdma2000 MAC can be adapted to a
wide variety of data services and operating environments.
The states are categorized as either connected or not connected depending on the status of
data service option. The data service option is connected in the control hold, active, and sus-
pended hold states. The data service option is not connected in the null, initialization, dormant,
or reconnect states. Fig. 15-6 shows the state diagram for the PLICF data service option.
PLDCF performs mapping of logical channels from PLICF to logical channels supported
by the specific physical layer. PLDCF performs multiplexing, demultiplexing, and consolidation
of control information with bearer data from the control and traffic channels from multiple
PLICF instances in the same mobile. PLDCF implements QoS capabilities, including resolution
of priorities between competing PLICF instances, and maps QoS requests from PLICF instances
into the appropriate physical layer service requests to deliver the desired QoS. The major func-
tions of this sublayer are to
• Perform any required mapping of the simpler logical channels from the PLICF into the
logical channels supported by physical layer
• Perform any (optional) automatic repeat request (ARQ) protocol functions that are
tightly integrated with physical layer
• Perform some of the physical-layer-specific low-level functions of IS-95B RLP
For cdma2000, four specific PLDCF ARQs are defined.
1. Radio Link Protocol (RLP). This protocol provides a highly efficient streaming ser-
vice that makes a best effort to deliver data between peer PLICF entities. RLP provides
both transparent and nontransparent modes of operation. In the nontransparent mode,
RLP uses ARQ protocol to retransmit data segments that were not delivered properly
by the physical layer. In the nontransparent mode, RLP can introduce some delay. In
the transparent mode, RLP does not retransmit missing data segments. However, RLP
362 Ch. 15 • cdma2000 System
maintains byte synchronization between the sender and receiver and notifies the
receiver of the missing parts of the data stream. Transparent RLP does not introduce
any transmission delay and is useful for implementing voice services over RLP.
2. Radio Burst Protocol (RBP). This protocol provides a mechanism for delivering rela-
tively short data segments with best-effort delivery over a shared access common traffic
channel (ctch). This capability is useful for delivering a small amount of data without
incurring the overhead of establishing a dedicated traffic channel (dtch).
3. Signaling Radio Link Protocol (SRLP). This protocol provides best-effort streaming
service for signaling information analogous to RLP, but optimized for the dedicated
signaling channel (dsch).
4. Signaling Radio Burst Protocol (SRBP). This protocol provides a mechanism to
deliver signaling messages with best-effort delivery analogous to RBP, but optimized
for signaling information and the common signaling channel (csch).
PLDCF includes a Radio Link Access Control (RLAC) function that abstracts the RLP
and RBP from PLICF and coordinates the transmission of data (traffic or signaling) between
RLP and RBP according to the current operational state of MAC (e.g., restricts the use of RBP
to cases in which PLICF is in the packet data dormant state).
The PLDCF MUX and QoS sublayer coordinates multiplexing and demultiplexing of code
channels from multiple PLICF instances. It implements and enforces QoS differences between
instances and maps the data streams and control information on multiple logical channels from
different PLICF instances into requests for logical channels, resources, and control information
from the physical layer.
• Detecting multipath rays so that RAKE fingers are efficiently assigned to the strongest
multipath
• Cell acquisition and handoff
With a common pilot, it is possible to send the pilot signal without incurring significant
overhead for each user. A system with a common pilot approach can achieve better performance
than a system using a per-user pilot approach. For voice traffic, the common pilot can provide
better channel estimation and lower overhead, resulting in improved receiver performance. It can
also provide improved search and handoff performance.
operates at a data rate of 9.6 or 4.8 kbps (same as IS-95). The F-PCH carries overhead messages,
pages, acknowledgments, channel assignments, status requests, and SSD updates from the base
station to the mobile.
There are two types of paging channels: shared F-PCH and wideband F-PCH. The
shared F-PCH provides service to both the IS-95B and cdma2000 when using the F-PCH in an
IS-95B underlay channel. This mode is applicable only in overlay configurations. The wide-
band F-PCH is modulated across the entire wideband channel. The wideband F-PCH is modu-
lated as a separate channel within the F-CPHCH. This mode is applicable to both overlay and
nonoverlay configurations.
Figs. 15-10 and 15-11 show F-CPHCH (F-PICH, F-SYNC, and F-PCH) for N = 1 and N ≥ 3.
W0
Wsync
Sync Channel
k = 9, r = 1/2 Repeat Block
A
Conv. Encoder 2 Times Interleaver
1.2 kbps 2.4 kbps 4.8 ksps
Wpaging
Paging Channel
k = 9, r = 1/2 Repeat Block
A
Conv. Encoder 1 or 2 Times Interleaver
9.6 kbps 19.2 kbps 19.2 ksps
4.8 kbps 9.6 kbps 19.2 ksps
W0
Wsync
Sync Channel
k = 9, r = 1/3 Repeat Block
X
Conv. Encoder 2 Times Interleaver
1.2 kbps 3.6 kbps 7.2 ksps
Wpaging
Paging Channel
k = 9, r = 1/3 Repeat Block
X
Conv. Encoder 1 or 2 Times Interleaver
9.6 kbps 28.8 kbps 28.8 ksps
4.8 kbps 14.4 kbps 28.8 ksps
Auxiliary pilots are code multiplexed with other forward link channels, and they use
orthogonal Walsh codes. Since a common pilot contains no data (all 0s), auxiliary pilots may
use a longer Walsh sequence to lessen the reduction of orthogonal Walsh codes available for
traffic channels. Auxiliary pilots can also be used for orthogonal diversity transmission in the
direct spread forward link. Furthermore, if the CDMA system uses a separate antenna array to
support directional or spot beams, it is necessary to provide a separate forward link pilot for
channel estimation.
The F-QPCH will contain a single bit message, the Quick Page message, to direct a slotted-
mode mobile to monitor its assigned slot on the paging channel that immediately follows. The
Quick Page message is sent up to 80 ms before the page message to alert the mobile to listen to
the paging channel. The F-QPCH uses a different modulation, so it will appear as a different
physical channel.
Note: Signal Point A feeds into Fig. 15.22. *Effective rate after puncturing
For N ≥ 3, the RS1 and RS2 F-FCHs are shown in Figs. 15-14 and 15-15, respectively. For
N = 3, 6, 9, and 12 and RS1, a 1/3 code rate is used. For N = 3, 6, 9, and 12 and RS2, code rates
of 1/2 and 1/4 are supported.
3.6864 Mcps
Direct Spread
N=3
0 1 2 3 4 5 MHz
Figure 15-20 Multicarrier and Direct Spread Approach on Forward Link in cdma2000
374 Ch. 15 • cdma2000 System
A A
f1 f1
f2 B B
f3 f2
C
f3
streams, and hence self-interference is eliminated in flat fading. Note that, by splitting
the coded bits into two separate streams, the effective number of spreading codes per
user is the same as the case without OTD. An auxiliary pilot is introduced for the addi-
tional antenna.
(0 0 0 0 0 0 0 0, 0 0 0 0 1 1 1 1); the remaining six 8-chip codes can be used since they are all
orthogonal to it. By induction, four 16-chip, eight 32-chip, sixteen 64-chip, and thirty-two 128-
chip codes must also be set aside to maintain orthogonality.
The 3G and 2G Walsh code assignments must be coordinated to insure that assigning the
longer-length codes does not block out all of the shorter codes.
I Data Puncture
A Channel PC Sym. YI
Gain (optional)
Long-Code
MUX and PC Bits
Mask for User m Bit PC
Long-Code Signal Point 16 bits/frame
Generator Selector Mapping Channel Walsh
±1 values
0 to +1 Gain
1 to –1
Q Data Puncture
I and Q Mapping, and Channel
Walsh Modulation PC Sym. YQ
Gain (optional)
+ Baseband
YI
Filter
PNQ – cos (2πfct ) s(t )
PN Q +
Baseband
YQ Filter
+
PN I sin (2πfct )
PN I = I-Channel PN Sequence 1.2288 Mcps
PNQ = Q-Channel PN Sequence 1.2288 Mcps
PC = Power Control
The overall structure of the multicarrier CDMA channel is shown in Fig. 15-23. After
scrambling with the long PN code corresponding to user m, the user data is demultiplexed into N
carriers, where N = 3, 6, 9, or 12. On each carrier, the demultiplexed bits are mapped onto I and
Q followed by Walsh spreading. When applicable, power control bits, for reverse closed-loop
power control, may be punctured onto the forward link channel at a rate of 800 Hz. The signal
on each carrier is orthogonally spread by the appropriate Walsh code function in such a manner
as to maintain a fixed chip rate of 1.2288 Mcps per carrier, where the Walsh code may differ on
each carrier. The signal on each carrier is then complex PN spread, as shown in Fig. 15-24, fol-
lowed by baseband filtering and frequency modulation.
N = 1, 3, 6, 9, and 12 direct spreading is shown in Fig. 15-25. The user data is first scram-
bled by the user long PN code followed by I and Q mapping, channel gain, power control
cos(2πfAt )
IA IA(t )
Long-Code Baseband
Mask for Filter
MUX and Complex Carrier A
User m WnA
IQ MAP
0 → +1
PN +
Spreading
1 → –1 QA Baseband QA(t )
Filter
Long-Code
Generator sin(2πfAt )
Z
cos(2πfBt )
IB IB (t )
Bit Baseband
Selector Filter
MUX and Complex Carrier B
WnB
IQ MAP
Z 0 → +1
PN +
Demultiplexer
Spreading
1 → –1 QB Baseband QB (t )
Filter
sin(2πfBt )
X + Z
. . .
. . .
. . .
cos(2πfLt )
IL IL(t )
Baseband
Filter
MUX and Complex Carrier L
WnL
IQ MAP
0 → +1
PN +
Spreading
1 → –1 QL Baseband QL(t )
Filter
sin(2πfLt )
Z
PN I
XQ +
PNQ PN Q
+
XI
+
PN I
MUX Control
Z
cos(2πfCt )
I Data Puncture
Baseband
Channel 1 PC Sym.
Filter
Gain in 1.25 ms
puncturing, and Walsh spreading. The power control bits may not be punctured onto the for-
ward link channel depending on the specific logical-to-physical channel mapping. Next, the
signal is complex PN spread, followed by baseband filtering and frequency modulation.
Fig. 15-26 provides a comparison between the forward physical channels used in IS-95A/B
and those used in cdma2000.
Traffic Traffic
Pilot Sync Paging
RS1 & RS2 RS3 to RS6
F-FCH
Figure 15-26 A Comparison between Forward Physical Channels for IS-95 and cdma2000
• Channels are orthogonal and use Walsh codes. Different-length Walsh codes are used to
achieve the same chip rate for different information bit rates.
• QPSK modulation is used before spreading to increase the number of usable Walsh
codes.
• Forward Error Correction (FEC) is used.
◆ Convolutional codes (k = 9) are used for voice and data.
◆ Turbo codes (k = 4) are used for high data rates on SCHs.
• Supports nonorthogonal forward link channelization.
◆ These are used when running out of orthogonal space (insufficient number of
Walsh codes).
◆ Quasiorthogonal functions are generated by masking existing Walsh functions.
• Synchronous forward link.
• Forward link transmit diversity.
• Fast-forward power control (closed loop) 800 times per second.
• Supplemental channel active set, subset of fundamental channel active set. The maxi-
mum data rate supported for RS3 and RS5 for supplemental channel is 153.6 kbps (raw
data rate). RS4 and RS6 will be supported only for voice calls with the fundamental
channel rates of up to 14.4 kbps (raw data rate).
• Frame lengths:
◆ 20-ms frames are used for signaling and user information
◆ 5-ms frames are used for control information.
15.8.1 The Reverse Access Channel (R-ACH) and the Reverse Common
Control Channel (R-CCCH)
These are common channels used for communication of layer 3 and MAC messages from
the mobile to the base station. The R-CCCH differs from the R-ACH in that the R-CCCH offers
extended capabilities beyond the R-ACH. For example, the R-CCCH supports lower latency
access procedures required for efficient operation of the packet data in suspended state.
The R-ACH and R-CCCH are multiple access channels as mobile stations transmit with-
out explicit authorization by the base station. The R-ACH and R-CCCH use a slotted ALOHA
type of mechanism with higher capture probabilities due to the CDMA properties of the channel
(simultaneous transmission of multiple users). There can be one or more access channels per fre-
quency assignment. Different access channels are distinguished by different long PN codes. The
R-CCCH is identical to the R-ACH for 9.6-kbps, 20-ms frames. Additional rates of 19.2 and
38.4 kbps and frames of 5 ms and 10 ms will be supported. Fig. 15-27 shows the structure of R-
ACH and R-CCCH.
Modulation
Enhanced Add 12-Bit Add 8 Block Symbols
Convolutional Symbol
Access Frame Encoder Interleaver
Encoder Repetition C
Channel Quality Tail (768
r = 1/4, k = 9 (4 × Factor)
Bits Indicator Bits Symbols)
Modulation
Reverse Add Add 8 Symbols
Convolutional
Common Frame Encoder Symbol Block
Encoder Repetition Interleaver
C
Control Quality Tail
r = 1/4, k = 9
Channel Bits Indicator Bits
• Channel Structure for the Reverse Common Control Channel for Spreading Rate 1
Pilot
(+1 Value)
MUX A
1 Power Control Bit per Symbol
PCG; 16 Power Control Repetition Pilot Channel +
Bits per Frame 384 N Copies Power Control Bits
Figure 15-28 Reverse Pilot Channel (R-PICH) Structure for Reverse Dedicated Channels
channel. Then, the I and Q data channels are spread using a complex-multiply-type PN spread-
ing approach (see Fig. 15-29 for reverse dedicated channel structure and Fig. 15-30 for reverse
link I and Q mapping for 1× and 3×).
Modulation
Reverse Add Add 8 Symbols
Convolutional Symbol
Dedicated Frame Encoder Block
Encoder Repetition
Interleaver
B
Control Quality Tail
r = 1/4, k = 9 (2 × Factor)
Channel Bits Indicator Bits
• Reverse Dedicated Control Channel Structure for Radio Configuration (RC) 3 and 5
Modulation
Reverse Add Add 8 Symbols
Add Convolutional Symbol
Dedicated Frame Encoder Symbol Block
Reserved Encoder Repetition
Puncture Interleaver
B
Control Quality Tail
Bits r = 1/4, k = 9 (2 × Factor)
Channel Bits Indicator Bits
• Reverse Dedicated Control Channel Structure for Radio Configuration (RC) 4 and 6
Note: Signal Point B feeds into Fig. 15.30
Walsh Cover
(+ + – – ) or (+ + – – – – + +) Complex Multiplier
Relative
Supplemental
C Gain
Channel 2 G S2
Pilot + +
Channel & + Baseband
Power Control
A Σ Σ Filter
Gp
Symbols + –
Dedicated Relative
Control B Gain cos(2πfct )
Channel GC
Walsh Cover
(+ + + + + + + + – – – – – – – – ) Σ Gain s(t )
Relative
Fundamental
C Gain
Channel
GF
+ +
Walsh Cover Baseband
(+ + + + – – – – + + + + – – – – ) Σ Σ Filter
Gp
Supplemental + +
Channel 1, Relative
Common Control C Gain sin(2πfct )
Channel, or Enhanced GS1
Access Channel
Walsh Cover
Walsh Cover
(+ – ), (+ + – – ), or (+ + – – + + – – )
(+ – )
for Supplemental Channel
(+ + + + – – – – )
for Common Control Channel and
Enhanced Access Channel Decimator
by Factor
of 2
I-Channel Q-Channel
PN Sequence PN Sequence
Notes :
1-Chip 1. Binary signals are represented with ±1 values with the
Delay mapping +1 for 0 and –1 for 1.
Unused channels and gated-off symbols are represented
with 0 values.
Long- 2. When the Common Control Channel or Enhanced
Long-Code Access Channel is used, the only additional channel is
Code
Mask the Pilot Channel.
Generator Reverse Link 3. All of the digital operations occur at the chip rate.
Figure 15-33 provides a comparison between the reverse physical channels used in IS-
95A/B and cdma2000.
Modulation
Add Add 8 Symbols
Convolutional Symbol Symbol Block
Channel Frame Reserved/
or Turbo
Repetition Puncture Interleaver
C
Bits Quality Encoder
Encoder
Indicator Tail Bits
Modulation
Add 8 Add 8 Symbols
Add Convolutional
Channel Reserved Encoder Symbol Symbol Block
Reserved or Turbo
Repetition Puncture Interleaver
C
Bits /Encoder Tail
Bits Encoder
Tail Bits Bits
Bits/Frame Bits Bits Rate (kbps) r Factor Deletion Symbols Rate (ksps)
24 (5 ms) 0 16 9.6 1/4 2× None 384 76.8
Notes:
1. The 5-ms frame is used only for the fundamental channels, and only rates of 14.4 kbps or less are used for the
fundamental channels.
2. Turbo coding may be used for the supplemental channels with rates of 28.8 kbps or more; otherwise k = 9
convolutional coding is used.
3. With convolutional coding, the reserved/encoder tail bits provide an encoder tail. With turbo coding, the first 2
of these bits are reserved bits that are encoded and the last 6 bits are replaced by an internally generated tail.
4. N is the number of consecutive 20-ms frames over which the interleaving is done (N = 1, 2 or 4).
New Channels
Common to IS-95
Reverse Physical Channels & cdma2000
R-FCH
R-FCH R-SCH
Figure 15-33 A Comparison of Reverse Physical Channels for IS-95 and cdma2000
• Independent data channels. Two types of physical data channels (R-FCH and R-
SCH) are used on the reverse link that can be adapted to a particular type of service.
The use of R-FCH and R-SCH enables the system to be optimized for multiple simulta-
neous services. These channels are separately coded and interleaved and may have dif-
ferent transmit power level and FER set points.
• Reverse power control. There are three components of reverse power control: open
loop, closed loop, and outer loop. Open-loop power control sets the transmit power
based upon the power that is received at the mobile. Open-loop power control compen-
sates for the path loss from the mobile to the base station and handles very slow fading.
Closed-loop power control consists of an 800-bps feedback loop from the base station
to the mobile to set the transmit power of the mobile. Closed-loop power control com-
pensates for medium to fast fading and inaccuracies in open-loop power control. Outer-
loop power control is implementation specific but typically adjusts the closed-loop
power control threshold in the base station to maintain a desired FER.
• Separate dedicated control channel. The reverse link consists of a separate low-rate,
low-power, continuous, orthogonal, dedicated control channel. This allows for a flexi-
ble dedicated control channel structure that does not impact the other pilot and physical
channel frame structures.
• Frame length. The cdma2000 system uses 5- and 20-ms frames for control informa-
tion on fundamental and dedicated control channels and uses 20-ms frames for other
types of data (including voice). Interleaving and sequence repetition are over the entire
frame interval. This provides improved time diversity over systems that use shorter
frames. The 20-ms frames are used for voice. A shorter frame would reduce the total
voice delay, but it would degrade the demodulation performance due to the shorter
interleaving span.
chip-rate factor. A guard band of 625 kHz would typically be used on both sides of the operator’s
allocated band.
Signaling, Data, PC
Packet
MAC, (PC)
Option BS MS
Voice/ Signaling, Voice, Data, PC, MAC 3 Data Bursts
Packet
BS Data Bursts MS
Option
1
Signaling, Voice, PC
Voice/ Fundamental Channel
Packet MAC, Data (Signaling), (PC)
BS MS Dedicated Control Channel
Option Supplemental Channel
Data Bursts
2 PC = Power Control
Figure 15-34 Logical-to-Physical Channels Mapping for Voice and Packet Services
To further reduce the overhead associated with assignment of dedicated channels, the
packet service allows for exchange of short bursts of user data when no dedicated channels are
present. This mode of operation may be suitable for mobile-IP registration, notification services
(e.g., e-mail notification), and location tracking services where the volume of data to be
exchanged is typically small.
Circuit services can be viewed as a special case of the packet services in the sense that
dedicated traffic and control channels are typically assigned to the MS for extended periods of
time during the circuit service sessions. This will lead to a less efficient use of the air-interface
capacity. However, some delay-sensitive services such as video applications require a dedicated
channel for the duration of the call.
user data frames (f-dtch) are time multiplexed in the F-FCH. In this mode, the control of MAC is
performed in a centralized manner since MAC messages are carried on the F-FCH which is typ-
ically in soft handoff to ensure reliability of delivery for upper layer signaling messages. The 5-
ms frames are used to carry short MAC messages in this mode. The F-SCH carries high-rate
RLP frames containing packet data, and transmission on the F-SCH is always scheduled in this
mode. Lower-rate RLP frames may be carried on the F-FCH. The transmission rate of F-SCH is
predefined using MAC messages. Forward link continuity and outer-loop power control in this
mode are maintained by the F-FCH.
The P2 mode of operation is an alternate basic packet data service and is similar to the P1
mode in the sense that upper layer signaling messages (f-dsch), MAC messages (f-dmch), and
user data frames (f-dtch) are time multiplexed in one channel. However, the physical channel
that is used to carry these logical channels is the F-DCCH, which may or may not be in soft
handoff. Thus, the control of the MAC can be performed in either a distributed or centralized
manner. To support the mixing of MAC signaling with RLP frames or upper layer signaling
information, the F-DCCH supports dual-frame-size operation (5 and 20 ms). The F-SCH carries
high-rate, scheduled RLP frames containing packet data as well as lower-rate RLP frames. The
rate for the lower-rate frames carried on F-SCH may be dynamically determined, but the trans-
mission rate of the high-rate scheduled frames carried on the F-SCH is prespecified using MAC
messages. Forward link continuity and outer-loop power control are maintained by the F-DCCH
and, therefore, the F-DCCH becomes unsharable in this mode.
The P3 mode is used for highly optimized packet data service with the potential support for
distributed control of the MAC layer (i.e., the f-dmch is carried in a physical channel that can be
operated with a reduced active set while upper layer signaling information is carried in a channel
with a full active set). In this mode, the F-FCH is primarily used to carry high-reliability, low-
delay upper layer messages. Power control bits are carried by F-FCH. The F-DCCH may be
shared to make a more efficient use of Walsh code resources. The F-DCCH carries the MAC sig-
naling (f-dmch) and may not be in soft handoff. Control of MAC can be performed in either a dis-
tributed or centralized manner. The F-SCH carries high-rate RLP frames containing packet data,
and transmission on the F-SCH is always scheduled in this mode. The transmission rate of F-SCH
is prespecified using MAC messages. Lower-rate RLP frames may be carried on the F-FCH. For-
ward link continuity and outer-loop power control in this mode are maintained by the F-FCH.
Concurrent Voice and Packet Services. The VP1 mode offers simultaneous basic voice
and packet data service by multiplexing upper layer signaling (f-dsch), MAC messages (f-
dmch), voice frames (f-dtch), and potentially low-rate RLP frames (f-dtch) into the F-FCH. Con-
trol of MAC is performed in a centralized manner. To support the mixing of MAC signaling with
RLP frames or upper layer signaling information, the F-FCH supports dual-frame-size operation
(5 and 20 ms). The F-SCH carries high-rate RLP frames containing packet data, and transmis-
sion on the F-SCH is always scheduled in this mode. Forward link continuity and outer-loop
power control are maintained by the F-FCH.
The VP2 mode also provides simultaneous voice and packet data service. To provide a
higher-quality voice service in conjunction with packet data service, the MAC messages (f-
Mapping of Logical Channels to Physical Channels 391
dmch) and potentially upper layer signaling (f-dsch) are carried on the F-DCCH. Control of
MAC can be performed in either a distributed (if F-DCCH is not in soft handoff) or centralized
(if DCCH is in soft handoff) manner. Power control bits are carried by the F-FCH. The F-DCCH
can be shared to make a more efficient use of Walsh code resources. To support the mixing of
MAC signaling with RLP frames or upper layer signaling information, the F-DCCH supports
dual-frame-size operation (5 and 20 ms). The F-SCH carries high-rate, scheduled RLP frames
containing packet data as well as lower-rate RLP frames. The low-rate RLP frames may be sent
on F-SCH to avoid the potential contention between voice and low-rate RLP frames on the F-
FCH. Forward link continuity and outer-loop power control are maintained by F-FCH.
Consult cdma2000 RTT [7] for circuit services and their combinations with voice and
packet services.
Table 15-7 Mapping of Forward Common Logical Channels to Forward Common Physical
Channels
Voice Services. In the V1 mode, the R-SCH and R-DCCH are not used. In this case the
upper layer signaling (r-dsch), voice frames (r-dtch), and power control information are multi-
plexed in R-FCH (e.g., using dim-and-burst or blank-and-burst mechanisms).
The V2 mode provides a higher voice-quality service typically by transmitting the upper
layer signaling frames on an R-DCCH (e.g., no blank-and-burst or dim-and-burst signaling).
However, if the mobile station cannot provide sufficient power to transmit on the R-DCCH, the
upper layer signaling information can be transmitted on the R-FCH.
Packet Services. P1 is offered on the reverse direction by using R-FCH and R-SCH. The
upper layer signaling message (r-dsch), MAC messages (r-dmch), and user data frames (r-dtch)
are time multiplexed in R-FCH. To support the mixing of MAC signaling with RLP frames or
upper layer signaling information, the R-FCH supports dual-frame-size operation (5 and 20 ms).
Evolution of cdmaOne (IS-95) to cdma2000 393
The R-SCH carries high-rate RLP frames containing packet data, and transmission on the R-
SCH is always scheduled. Lower-rate RLP frames may be carried on R-FCH.
In the P2 mode, upper layer signaling messages (r-dsch), MAC messages (r-dmch), and
user data frames (r-dtch) are time multiplexed in R-DCCH. To support the mixing of MAC sig-
naling with RLP frames or upper layer signaling information, the R-DCCH supports dual-frame-
size operation (5 and 20 ms). The R-SCH carries high-rate scheduled RLP frames containing
data as well as lower-rate RLP frames.
R-FCH is primarily used to carry high-reliability, low-delay upper layer messages as well
as power control information. The R-DCCH carries the MAC signaling (r-dmch). The R-SCH
carries high-rate RLP frames containing packet data, and transmission on the R-SCH is always
scheduled. Lower-rate RLP frames may be carried on the R-FCH.
Concurrent Voice and Packet Data. The VP1 mode (which offers simultaneous basic
voice and packet data service) multiplexes upper layer signaling (r-dsch), MAC messages (r-
dmch), voice frames (r-dtch), and, potentially, low-rate RLP frames (r-dtch) into the R-FCH. To
support the mixing of MAC signaling with RLP frames or upper layer signaling information, the
R-FCH supports dual-frame-size operation (5 and 20 ms). The R-SCH carries high-rate RLP
frames containing packet data, and transmission on the R-SCH is always scheduled in this mode.
In the VP2 mode, the MAC messages (r-dmch) and potentially upper layer signaling infor-
mation (r-dsch) are carried on R-DCCH (thereby reducing potential disruption due to dim-and-
burst and blank-and-burst signaling). However, if the mobile cannot provide sufficient power to
transmit on the R-DCCH, the upper layer signaling information can be transmitted on the R-
FCH. To support the mixing of MAC signaling with RLP frames or upper layer signaling infor-
mation, the R-DCCH supports dual-frame-size operation (5 and 20 ms). The R-SCH carries
high-rate, scheduled RLP frames containing packet data as well as lower-rate RLP frames. The
low-rate RLP frames may be sent on the R-SCH to avoid the potential contention between voice
and low-rate RLP frames on the R-FCH.
Table 15-9 Mapping of Reverse Common Logical Channels to Reverse Common Physical
Channels
rush is on to create the wireless office that can easily tie mobile workers to the enterprise. Fur-
ther, there is great potential for push technologies that deliver news and other information
directly to a wireless device—this could create entirely new revenue streams for operators.
Although cdmaOne networks were not the first to offer data access, these networks are
uniquely designed to accommodate data. To start with, they handle data and voice transmissions
in much the same way. cdmaOne’s inherent variable-rate transmission capability allows data rate
determination to accommodate the amount of information being sent, so system resources are
used only as needed. Because cdmaOne systems employ a packetized backbone for voice,
packet data capabilities are already inherent in the equipment. The cdmaOne packet data trans-
mission technology uses a TCP/IP-compliant Cellular Digital Packet Data (CDPD) protocol
stack to enable seamless connectivity with enterprise networks and to expedite third-party appli-
cation development.
Adding data to the cdmaOne network will allow an operator to continue using its existing
radios, backhaul facilities, infrastructure, and handsets while merely implementing a software
upgrade with an interworking function. Upgrading to IS-95B allows for code or channel aggrega-
tion to provide data rates of 64–115 kbps, as well as offering improvements in soft handoffs and
interfrequency hard handoffs. Equipment manufacturers have already announced IS-707 packet
data, circuit-switched data, and digital fax capabilities on its cdmaOne infrastructure equipment.
Mobile IP, the proposed Internet standard for mobility, is an enhancement to basic packet
data services. Mobile IP lets users maintain a continuous data connection and retain a single IP
address while traveling between base station controllers (BSCs) or roaming on other CDMA
networks.
One of the key objectives of ITU IMT-2000 is the creation of standards that will encourage
a worldwide frequency band to promote a high degree of design commonality and to support
high-speed data services. IMT-2000 will utilize small pocket terminals, an expanded range of
operation environments, and the deployment of an open architecture that allows the graceful
introduction of newly created technology. Furthermore, 3G systems promise to deliver wireless
voice services with wireline quality levels, along with the speed and capacity needed to support
Evolution of cdmaOne (IS-95) to cdma2000 395
voice over IP. With phase two, true multimedia services will be available to bring additional rev-
enue opportunities for operators. Multimedia services will be made possible through enhanced
packet data MAC, full support for packet data services up to 2 Mbps, RLP support for all data
rates up to 2 Mbps, and the advanced multimedia call model.
In the area of signaling and services, phase two cdma2000 will bring native 3G cdma2000
signaling structure to the link access control (LAC) and upper layer signaling structure. This
structure will provide support for enhanced privacy, authentication, and encryption functionality.
An operator’s existing architecture and network equipment can greatly affect the ease of this
migration. A network built on an open, advanced architecture with a clear upward migration
pathway can attain 1xRTT capabilities with a simple modular upward movement of the H-band
operation of the radio. Networks with a less flexible architecture may be required to take the
more costly steps of replacing the entire base transceiver system (BTS). To achieve the expected
144-kbps peak data rate performance, operators can make software upgrades to networks and
base stations to support 1xRTT data protocol.
Packet Data Service Node (PDSN) will be required to support data connectivity to the
Internet/intranet. Many equipment vendors already offer solutions that incorporate PDSN ele-
ments, thus opening a smooth upward pathway to 3G technologies.
The recent agreement between Qualcomm and Ericsson proposes three optional CDMA
modes and the eventual development of a global standard that is compatible with both ANSI
IS-41 and GSM MAP. This approach envisions the use of multimode handsets and various mar-
ket-driven solutions as the surest pathway to a unified CDMA 3G standard in the next genera-
tion of wireless communications. As subscribers demand greater wireless power and
convenience, the migration to 3G technology will benefit operators by supporting higher capa-
bilities, lowering network costs, and increasing overall profitability. Fig. 15-35 shows the
cdmaOne evolution timeline.
cdmaOne operators will be able to upgrade to 3G system without acquiring additional
spectrum, a key component to minimum time to market without additional, significant invest-
ment. The design of cdma2000 will allow for deployment of the 3G enhancements while main-
taining existing 2G support for cdmaOne in the spectrum being used by an operator today.
Both cdma2000 phase one and phase two can be intermingled with cdmaOne to maximize
the effective use of spectrum according to the needs of an individual operator’s customer base.
For example, an operator with a strong demand for high-speed data service may choose to
deploy a combination of cdma2000 phase one and cdmaOne that uses more channels for
cdma2000 (see Fig. 15-36). In another market, users may not be as quick to adopt high-speed
data services, and more channels will remain dedicated to cdmaOne services. As cdma2000
phase two capabilities become available, an operator has even more choices of ways in which to
use the spectrum to support the new services (see Figs. 15-37 and 15-38).
2G 3G
cdmaOne
2 Mbps cdma2000
Phase Two
64 kbps IS-95B
1999 2001
Figure 15-35 cdmaOne Evolution Timeline
5 MHz
7.5 MHz
Figure 15-37 Intermixing of cdma2000 Phase One and cdma2000 Phase Two
10 MHz
Figure 15-38 Intermixing of cdmaOne, cdma2000 Phase One, and cdma2000 Phase Two
398 Ch. 15 • cdma2000 System
15.13 Summary
This chapter first presented cdma2000 layering structure and logical and physical channels and
then concentrated on the cdma2000 physical layer, providing details of forward/reverse dedi-
cated and common physical channel structures. We described forward and reverse link features
and pointed out the improvements of cdma2000 over cdmaOne.
We briefly discussed data services in cdma2000 and considered the mapping of logical
channels. Next we presented the evolution plans for cdmaOne to cdma2000. We concluded the
chapter by providing the major technical differences between cdma2000 and W-CDMA.
15.14 References
1. “CDMA for Next Generation Mobile Communications Systems,” IEEE Communications
Magazine 36(9), September 1998.
2. Dahlman, E., Gumudson, B., Nilsson, M., and Skold, J., “UMTS/IMT-2000 Based Wide-
band CDMA,” IEEE Communications Magazine 36(9), September 1998.
3. Garg, V. K., Halpern, S., and Smolik, K. F., “Third Generation (3G) Mobile Communication
Systems,” 1999 IEEE International Conference on Personal Wireless Communications,
Jaipur, India, February 1999.
4. Knisley, D., Quinn, L., and Ramesh, N., “cdma2000: A Third Generation Radio Transmis-
sion Technology,” Bell Labs Technical Journal 3(3), July–September 1998.
5. Rao, Y. S., and Kripalani, A., “cdma2000 Mobile Radio Access for IMT-2000,” 1999 IEEE
International Conference on Personal Wireless Communications, Jaipur, India, February
1999.
6. Shanker, B., McClelland, S., “Mobilising the Third-Generation [Cellular Radio],” Journal of
Telecommunications (International Edition), August 1997.
7. TIA TR 45.5, “The cdma2000 ITU-RTT Candidate Submission,” TR 45-ISD/98.06.02.03,
May 15, 1998.
A P P E N D I X A
Traffic Tables
This appendix provides traffic tables for a variety of blocking probabilities and channels. The
blocked-calls-cleared (Erlang B) call model is used. In Erlang B, when traffic arrives in the sys-
tem, we assume that it either is served, with probability from the table, or is lost to the system. A
customer attempting to place a call will therefore either see a call completion or will be blocked
and will abandon the call. This assumption is acceptable for low blocking probabilities. In some
cases, the call will be placed again after a short period of time. If too many calls reappear in the
system after a short delay, the Erlang B model will no longer hold.
399
400 Apx. A • Traffic Tables
Abbreviations
A
AC Authentication Center
ACCLOC Access Overload Class
ACH Access Channel
ACK Acknowledgment
ACM Address Complete Message
ACSE Association Control Service Element
ADPCM Adaptive Differential Pulse Code Modulation
AMPS Advanced Mobile Phone Service
ANSI American National Standard Institute
ARPA Advanced Research Project Agency
ARQ Automatic Repeat Request
AT Prefix for dialing using a modem
AUC Authentication Center
AWGN Additive White Gaussian Noise
B
BB Baseband filter
BCAF Bearer Control Agent Function
BCCH Broadcast Control Channel
403
404 Apx. B • Abbreviations
C
CASE Common Application Service Element
CAPICH Common Auxiliary Pilot Channel
CBSEED Codebook Seed
CC Connection Confirm
CC Country Code
CCAF Call Control Agent Function
CCCH Common Control Channel
CCF Call Control Function
CCR Commitment Concurrency and Recovery
CCAF’ Call Control Agent Function (enhanced)
CCF’ Call Control Function (enhanced)
CDG CDMA Development Group
CDMA Code Division Multiple Access
CDPD Cellular Digital Packet Data
CELP Code-Excited Linear Predictor
CH Channel
CI Cell Identity
CGI Cell Global Identification
CLIP Connectionless Interworking Protocol
CM Connection Management
COUNT Call history parameter
COST Committee On Standards and Technology
CR Connection Request
Apx. B • Abbreviations 405
D
DAPICH Dedicated Auxiliary Pilot Channel
dB Decibels
dBm Decibels with respect to 1 milliwatt
DCCH Dedicated Control Channel
DLCI Data Link Connection Identifier
DMH Data Message Handler
DPC Destination Point Code
DQPSK Differential Quadrature Phase Shift Keying
DS Direct Sequence
DSP Digital Signal Processing
DSSS Direct Sequence Spread Spectrum
DTAP Direct Transfer Application Part
DTMF Dual-Tone Multifrequency
E
EIR Equipment Identity Register
ETSI European Telecommunications Standards Institute
ESN Electronic Serial Number
EVRC Enhanced Variable Rate Codec
F
FAF Floor Attenuation Factor
FCH Fundamental Channel
FCC Federal Communication Commission
FD Full Duplex
FDD Frequency Division Duplex
FDMA Frequency Division Multiple Access
FE Functional Entity
FEC Forward Error Correction
FER Frame Error Rate
FFPC Fast-Forward Power Control
406 Apx. B • Abbreviations
G
G Codebook Gain
GBN Go-Back-N
GFSK Gaussian Frequency Shift Keying
GHz gigaHertz
GSM Global System of Mobile Communications
GoS Grade of Service
GPRS General Packet Radio Service
H
HCM Handoff Completion Message
HD Half Duplex
HDM Handoff Direction Message
HLR Home Location Register
Hz Hertz
I
IAM Initial Address Message
ICMP Internet Control Message Protocol
IF Intermediate Frequency
IMT-2000 International Mobile Telecommunications in year 2000
IMSI International Mobile Subscriber Identifier
IN Intelligent Network
INAP Intelligent Network Application Part
IP Internet Protocol
IPCP Internet Protocol Control Protocol
IPR Intellectual Property Rights
ISDN Integrated Services Digital Network
ISM Industrial Scientific Medical
ISO International Organization for Standardization
Apx. B • Abbreviations 407
J
J Joules
K
K Kelvin
kbps kilobits per second
kHz kilohertz
km kilometers
km/h kilometers per hour
L
LAC Link Access Control
LAC Location Area Code
LBT Listen-Before-Talk
LCP Link Control Protocol
LLC Logical Link Control
LPC Linear Predictive Coding
LPF Low Pass Filter
LOS Line-of-Sight
LS Least Squares
LSP Linear Spectral Pairs
M
MAC Medium Access Control
MAN Metropolitan Area Network
MAP Mobile Application Part
MBS Mobile Broadband Systems
Mbps Megabits per second
Mcps Megachips per second
MC Message Center
408 Apx. B • Abbreviations
N
NID Network Identification
NE Network Element
NLUM Neighbor List Update Message
NMSI National Mobile Subscriber Identity
O
OA&M Operation Administration and Maintenance
OMC Operation Maintenance Center
OQPSK Offset Quadrature Phase Shift Keying
Apx. B • Abbreviations 409
OS Operations System
OSI Open System Interconnection
OSS Operations Support System
OTAF Over-the-Air Function
OTASP Over-the-Air Service Provisioning
OTD Orthogonal Transmit Diversity
P
PACA Priority Access Channel Assignment
PBX Private Branch Exchange
PCG Power Control Group
PCH Paging Channel
PCM Pulse Code Modulation
PCMCIA Personal Computer Memory Card International Association
PCS Personal Communication Services
PDA Personal Digital Assistance
PICH Pilot Channel
PIN Personal Identification Number
PMRM Pilot Strength Measurement Message
PN pseudonoise
PPDN Public Packet Data Network
PPP Point-to-Point Protocol
PSK Phase Shift Keying
psd power spectral density
PSMM Power Measurement Report Message
PSTN Public Switched Telephone Network
Q
QCELP Qualcomm Code-Excited Linear Prediction
QoS Quality of Service
QPSK Quadrature Phase Shift Keying
R
RACE Research in Advanced Communications Equipment
RACF Radio Access Control Function
410 Apx. B • Abbreviations
S
SACF Service Access Control Function
SASE Specific Application Service Element
SBS Switched Beam System
SCCP Signaling Connection Control Part
SCF Service Control Function
SCH Supplementary Channel
SCI Synchronized Capsule Indicator
SCP Switching Control Point
SDF Service Data Function
SID System Identification
SIR Signal-to-Interference Ratio
SLS Signaling Link Selection
SMF Service Management Function
SMRS Specialized Mobile Radio Services
SMS Short Message Service
SNR Signal-to-Noise Ratio
SNDCF Sub-Network Dependent Convergence Function
Apx. B • Abbreviations 411
T
TACAF Terminal Access Control Agent Function
TACF Terminal Access Control Function
TCAP Transaction Capabilities Application Part
TCH Traffic Channel
TCP Transport Control Protocol
TDD Time Division Duplex
TDM Time Division Multiplex
TDMA Time Division Multiple Access
TE Terminal Equipment
THSS Time-Hopped Spread Spectrum
TIA Telecommunication Industry Association
TIMF Terminal Identification Management Function
TMA Telesystems Micro-cellular Architecture
TMSI Temporary Mobile Subscriber Identity
TRAC Telecommunication Research and Action Center
U
UDP User Data Protocol
UIMF User Identification Management Function
UMTS Universal Mobile Telephone Service
412 Apx. B • Abbreviations
V
VLR Visitor Location Register
VLSI Very Large Scale Integration
W
WARC World Administration Radio Conference
W-CDMA Wideband CDMA
WLAN Wireless Local Area Network
WLL Wireless Local Loop
WORM Window control Operation-based Reception Memory
WPBX Wireless Private Branch Exchange
X
XC Transcoder
A P P E N D I X C
Additional References
Adachi, F., Sawahashi, M., and Suda, H., “Wideband DS-CDMA for Next Generation Mobile
Communications Systems,” IEEE Communication Magazine 36(9), September. 1998.
Applebaum, S. P., “Adaptive Arrays,” IEEE Transactions on Antenna and Propagation, AP-24,
September 1976, pp. 585–98.
Bang S. C., “Performance Analysis of a Wideband CDMA System for FPLMTS,” Proceedings
of IEEE VTC, May 1997.
Benedetto, S., and Montorsi, G., “Design of Parallel Concatenated Convolutional Codes,” IEEE
Transactions on Communications 44(5), May 1996.
Benedetto, S., Garello, R., and Montorsi, G., “A Search for Good Convolutional Codes to be
Used in the Construction of Turbo Codes,” IEEE Transactions on Communications 46(9), Sep-
tember 1998.
Braun, W. R., and Dersch, U., “A Physical Mobile Radio Channel Model, “ IEEE Transactions
on VT, VT-40(2), May 1991, pp. 472–82.
Chan, M., C., and Woo, T. Y. C., “Next Generation Wireless Data Services: Architecture and
Experience,” IEEE Personal Communications 6(1), February 1999, pp. 20–33.
Chang, C. R., Wan, J. Z., and Yee, M. F., “PN Offset Planning Strategies for Non-Uniform
CDMA Networks,” Proceeding of IEEE VTC, Arizona, May 1997, pp. 1543–47.
Chopra, M., Rohani, K., and Reed, J., “Analysis of CDMA Range Extension Due to Soft Hand-
off,” Proceedings of IEEE VTC, Chicago, July 1995, pp. 917–21.
Compton, R. T., Adaptive Antennas (Concepts and Performance), Prentice Hall, Englewood
Cliffs, NJ, 1988.
413
414 Apx. C • Additional References
Naguib, A., Paulraj, A., and T. Kailath, “Capacity Improvement with Base Station Antenna
Arrays in Cellular CDMA,” IEEE, Trans. on VT, VT-43(3), August 1994, pp. 691–4.
Nanda, S., “Teletraffic Models for Urban and Suburban Microcells: Cell Sizes and Handoff
Rates,” IEEE Trans. Vehicular Tech. 42(4), November 1993, pp 673–82.
Nikula, E., et al., “FRAMES Multiple Access for UMTS and IMT-2000,” IEEE Personal Com-
munications 5(2), April 1998, pp. 16–24.
Nobelen, R. V., et al., “An Adaptive Radio Link Protocol with Enhanced Data Rates for GSM
Evolution,” IEEE Personal Communications 6(1), February 1999, pp. 54–63.
Ojanpera, Tero, and Prasad, R., “An Overview of Third-Generation Wireless Personal Commu-
nications: A European Perspective,” IEEE Personal Communications 5 (6), December 1998,
pp. 59–65.
Ojanpera, Tero, et al., “Comparison of Multiple Access Schemes for UMTS,” Proceedings of
IEEE VTC, May 1997.
Ojanpera, Tero, et al., “Analysis of CDMA and TDMA for Third Generation Mobile Radio Sys-
tems,” Proceedings of IEEE VTC, May 1997.
Padgett, J. E., Gunther, C. G., and Hattori, T., “Overview of Wireless Personal Communica-
tions,” IEEE Communications Magazine 33(1), January 1995, pp. 28–41.
Pollini, G. P., “Trends in Handover Design,” IEEE Communications Magazine, March 1996, pp.
82–90.
Prasad, N. R., “GSM Evolution Towards Third Generation UMTS/IMT-2000,” 1999 IEEE Inter-
national Conference on Personal Wireless Communications, Jaipur, India, February 1999.
Proakis, J. G., Digital Communications, McGraw-Hill, New York, 1989.
Skold, J., et al., “Cellular Evolution into Wideband Services,” Proceedings of IEEE VTC, May
1997.
Soroushnejad, M., and Geraniotis E., “Multi-Access Strategies for an Integrated Voice/Data
CDMA Packet Radio Network,” IEEE Transaction of Communications 43, February 1995,
pp. 934–45.
Suard, B., Naguib, A., and Paulraj, A., Performance Analysis of CDMA Mobile Communication
Systems Using Antenna Arrays, Proceeding IC-ASSP’93, Volume VI, Minneapolis, MN, April
1994, pp. 153–56.
Tripathi, N. D., Reed, J. H., and Vanlandingham, H. F., “Handoff in Cellular Systems,” IEEE
Personal Communications 5(6), December 1998, pp. 26–37.
Viterbi, A. J., and Padovani, R., “Implications of Mobile Cellular CDMA,” IEEE Communica-
tion Magazine 30(12), December 1992, pp. 38–41.
Viterbi, A. J., et al., “Soft Handoff Extends CDMA Cell Coverage and Increases Reverse Link
Capacity,” IEEE JSAC 12(8), October 1994, pp. 1281–87.
416 Apx. C • Additional References
Winters, J. H., “Signal Acquisition and Tracking with Adaptive Arrays in Digital Mobile Radio
System IS-54 with Flat Fading, IEEE Trans. VT 2(4), July 1993, pp. 377–84.
Wong, D., “Soft Handoff in CD,” IEEE Personal Communications,” December 1997, pp. 6–17.
Wu, J. T.-H., and Geraniotis, E., “Power Control in Multi-Media CDMA Networks,” Proceeding
IEEE Vehicular Technology Conference, 1995, pp. 789–93.
Zou, J., and Bhargava, V. K., “On Soft Handoff, Erlang Capacity and Service Quality of a
CDMA Cellular System: Reverse Link Analysis,” IEEE International Symp. Personal, Indoor,
Mobile Radio Communications, Toronto, Canada, September 1995, pp. 603–7.
Index
Analysis by Synthesis, 46
A
Antenna Gain, 73–76
A-interface, 82, 156–167 Asynchronous Data and Group 3 FAX, 334–338
A-key, 218 Authentication, 149–150
Access Channel, 92, 96, 111, 118–122 Center, 82
Modulation Parameters, 100 Challenge Response Message, 118–119, 127,
Access Methods, 325–329 131
Fixed-Assignment, 325–326 MS Data Bursts, 222
Random, 326–329 MS Origination, 220–221
Access Parameters Message, 117 MS Registration, 219
Access Technologies, 5–7 MS Terminations, 221
Acknowledgement procedure, 140 TMSI Assignment, 222–223
Adaptive Antenna Array, 77 Unique Challenge Response Procedure, 219–
Adaptive Differential Pulse Code Modulation, 43– 220
44 Autocorrelation, 29–30
Adaptive Predictive Coding, 45 Automatic Repeat Request, 154
Additive White Gaussian Noise, 11
Advanced Mobile Phone System, 103, 105–106
Advanced Research Project Agency, 325 B
Alliance for Telecommunications Industry
Association, 83 Bandpass Filter, 13, 16
Analog System to Digital System Transition, 255– Base Station, 6, 81, 159
268 Application Part, 157
Integrated Design, 256–257 Controller, 81
Overlay Design, 255–256 Management Application Part, 83, 157, 163–
Partial CDMA Coverage, 257–261 166
Advanced Mobile Phone System, 103, 105–106 Base Transceiver System, 81
417
418 Index
M O
Traffic Channel, 92
Forward, 93, 95–96 W
Reverse, 97–98 Walsh Codes, 112–113, 116, 123–124
Transmission Control Protocol, 155 Walsh Functions, 34–37, 91
Transmission Facilities Management, 162 Wideband CDMA, 4
TR-45/TR-46 Reference Model, 79–83 Wireless Data Systems, 316
Functional Model, 83–85 Local Area Networks, 317–321
Wide Area, 3, 316–317
Wireless Local Area Standard, 321–325
U High Performance Radio
IEEE 802.11, 321–324
User Data Protocol, 155
Local Area Network, 324–325
User Identification Management Function, 87
Wireless Information Network Forum, 324
423
P R E N T I C E H A L L
PH PTR Online!
We strive to stay on the cutting-edge of what’s happening in
professional computer science and engineering. Here’s a bit of what
you’ll find when you stop by www.phptr.com:
Special interest areas offering our latest books, book series, software,
features of the month, related links and other useful information to
help you get the job done.
Deals, deals, deals! Come to our promotions section for the latest
bargains offered to you exclusively from our retailers.
What’s New at PH PTR? We don’t just publish books for the professional
community, we’re a part of it. Check out our convention schedule, join
an author chat, get the latest reviews and press releases on topics of
interest to you.