SlideShare a Scribd company logo
1 of 43
Cordless Systems and Wireless
Local Loop
Chapter 11
Cordless System Operating
Environments
 Residential – a single base station can
provide in-house voice and data support
 Office
 A single base station can support a small office
 Multiple base stations in a cellular
configuration can support a larger office
 Telepoint – a base station set up in a public
place, such as an airport
Design Considerations for
Cordless Standards
 Modest range of handset from base station,
so low-power designs are used
 Inexpensive handset and base station,
dictating simple technical approaches
 Frequency flexibility is limited, so the
system needs to be able to seek a low-
interference channel whenever used
Time Division Duplex (TDD)
 TDD also known as time-compression
multiplexing (TCM)
 Data transmitted in one direction at a time,
with transmission between the two
directions
 Simple TDD
 TDMA TDD
Simple TDD
 Bit stream is divided into equal segments,
compressed in time to a higher transmission rate,
and transmitted in bursts
 Effective bits transmitted per second:
R = B/2(Tp+Tb+Tg)
 R = effective data rate
 B = size of block in bits
 Tp = propagation delay
 Tb = burst transmission time
 Tg = guard time
Simple TDD
 Actual data rate, A:
A = B /Tb
 Combined with previous equation:
 The actual data rate is more than double the
effective data rate seen by the two sides







 


b
g
p
T
T
T
R
A 1
2
TDMA TDD
 Wireless TDD typically used with TDMA
 A number of users receive forward channel
signals in turn and then transmit reverse
channel signals in turn, all on same carrier
frequency
 Advantages of TDMA/TDD:
 Improved ability to cope with fast fading
 Improved capacity allocation
DECT Frame Format
 Preamble (16 bits) – alert receiver
 Sync (16 bits) – enable receiver to
synchronize on beginning of time slot
 A field (64 bits) – used for network control
 B field (320 bits) – contains user data
 X field (4 bits) – parity check bits
 Guard (60 bits) – guard time, Tg
A Field Logical Control Channels
 Q channel – used to broadcast general system
information from base station to all terminals
 P channel – provides paging from the base station
to terminals
 M channel – used by terminal to exchange
medium access control messages with base station
 N channel – provides handshaking protocol
 C channel – provides call management for active
connections
B Field
 B field transmits data in two modes
 Unprotected mode - used to transmit digitized
voice
 Protected mode - transmits nonvoice data traffic
DECT Protocol Architecture
DECT Protocol Architecture
 Physical layer – data transmitted in TDMA-TDD
frames over one of 10 RF carriers
 Medium access control (MAC) layer – selects/
establishes/releases connections on physical
channels; supports three services:
 Broadcast
 Connection oriented
 Connectionless
 Data link control layer – provides for the reliable
transmission of messages using traditional data
link control procedures
Differential Quantization
 Speech signals tend not to change much between
two samples
 Transmitted PCM values contain considerable
redundancy
 Transmit difference value between adjacent
samples rather than actual value
 If difference value between two samples exceeds
transmitted bits, receiver output will drift from the
true value
 Encoder could replicate receiver output and additionally
transmit that difference
Differential PCM (DPCM)
 Since voice signals change relatively slowly, value
of kth sample can be estimated by preceding
samples
 Transmit difference between sample and estimated
sample
 Difference value should be less than difference between
successive samples
 At the receiver, incoming difference value is
added to the estimate of the current sample
 Same estimation function is used
Adaptive Differential PCM
(ADPCM)
 Improve DPCM performance using
adaptive prediction and quantization
 Predictor and difference quantizer adapt to the
changing characteristics of the speech
 Modules
 Adaptive quantizer
 Inverse adaptive quantizer
 Adaptive predictor
ADPCM Encoder
ADPCM Decoder
Subject Measurement of Coder
Performance
 Subjective measurements of quality are
more relevant than objective measures
 Mean opinion score (MOS) – group of
subjects listen to a sample of coded speech;
classify output on a 5-point scale
 MOS scale is used in a number of
specifications as a standard for quality
Wireless Local Loop
 Wired technologies responding to need for
reliable, high-speed access by residential,
business, and government subscribers
 ISDN, xDSL, cable modems
 Increasing interest shown in competing wireless
technologies for subscriber access
 Wireless local loop (WLL)
 Narrowband – offers a replacement for existing
telephony services
 Broadband – provides high-speed two-way voice and
data service
WLL Configuration
Advantages of WLL over Wired
Approach
 Cost – wireless systems are less expensive due to
cost of cable installation that’s avoided
 Installation time – WLL systems can be installed
in a small fraction of the time required for a new
wired system
 Selective installation – radio units installed for
subscribers who want service at a given time
 With a wired system, cable is laid out in anticipation of
serving every subscriber in a given area
Propagation Considerations for
WLL
 Most high-speed WLL schemes use millimeter
wave frequencies (10 GHz to about 300 GHz)
 There are wide unused frequency bands available above
25 GHz
 At these high frequencies, wide channel bandwidths
can be used, providing high data rates
 Small size transceivers and adaptive antenna arrays can
be used
Propagation Considerations for
WLL
 Millimeter wave systems have some
undesirable propagation characteristics
 Free space loss increases with the square of the
frequency; losses are much higher in millimeter
wave range
 Above 10 GHz, attenuation effects due to
rainfall and atmospheric or gaseous absorption
are large
 Multipath losses can be quite high
Fresnel Zone
 How much space around direct path between
transmitter and receiver should be clear of
obstacles?
 Objects within a series of concentric circles around the
line of sight between transceivers have
constructive/destructive effects on communication
 For point along the direct path, radius of first
Fresnel zone:
 S = distance from transmitter
 D = distance from receiver
D
S
SD
R



Atmospheric Absorption
 Radio waves at frequencies above 10 GHz
are subject to molecular absorption
 Peak of water vapor absorption at 22 GHz
 Peak of oxygen absorption near 60 GHz
 Favorable windows for communication:
 From 28 GHz to 42 GHz
 From 75 GHz to 95 GHz
Effect of Rain
 Attenuation due to rain
 Presence of raindrops can severely degrade the
reliability and performance of communication links
 The effect of rain depends on drop shape, drop size,
rain rate, and frequency
 Estimated attenuation due to rain:
 A = attenuation (dB/km)
 R = rain rate (mm/hr)
 a and b depend on drop sizes and frequency
b
aR
A 
Effects of Vegetation
 Trees near subscriber sites can lead to multipath
fading
 Multipath effects from the tree canopy are
diffraction and scattering
 Measurements in orchards found considerable
attenuation values when the foliage is within 60%
of the first Fresnel zone
 Multipath effects highly variable due to wind
Multipoint Distribution Service
(MDS)
 Multichannel multipoint distribution service
(MMDS)
 Also referred to as wireless cable
 Used mainly by residential subscribers and small
businesses
 Local multipoint distribution service (LMDS)
 Appeals to larger companies with greater bandwidth
demands
Advantages of MMDS
 MMDS signals have larger wavelengths and
can travel farther without losing significant
power
 Equipment at lower frequencies is less
expensive
 MMDS signals don't get blocked as easily
by objects and are less susceptible to rain
absorption
Advantages of LMDS
 Relatively high data rates
 Capable of providing video, telephony, and
data
 Relatively low cost in comparison with
cable alternatives
802.16 Standards Development
 Use wireless links with microwave or millimeter
wave radios
 Use licensed spectrum
 Are metropolitan in scale
 Provide public network service to fee-paying
customers
 Use point-to-multipoint architecture with
stationary rooftop or tower-mounted antennas
802.16 Standards Development
 Provide efficient transport of heterogeneous traffic
supporting quality of service (QoS)
 Use wireless links with microwave or millimeter
wave radios
 Are capable of broadband transmissions (>2
Mbps)
IEEE 802.16 Protocol
Architecture
Protocol Architecture
 Physical and transmission layer functions:
 Encoding/decoding of signals
 Preamble generation/removal
 Bit transmission/reception
 Medium access control layer functions:
 On transmission, assemble data into a frame with
address and error detection fields
 On reception, disassemble frame, and perform address
recognition and error detection
 Govern access to the wireless transmission medium
Protocol Architecture
 Convergence layer functions:
 Encapsulate PDU framing of upper layers into
native 802.16 MAC/PHY frames
 Map upper layer’s addresses into 802.16
addresses
 Translate upper layer QoS parameters into
native 802.16 MAC format
 Adapt time dependencies of upper layer traffic
into equivalent MAC service
IEEE 802.16.1 Services
 Digital audio/video multicast
 Digital telephony
 ATM
 Internet protocol
 Bridged LAN
 Back-haul
 Frame relay
IEEE 802.16.3 Services
 Voice transport
 Data transport
 Bridged LAN
IEEE 802.16.1 Frame Format
IEEE 802.16.1 Frame Format
 Header - protocol control information
 Downlink header – used by the base station
 Uplink header – used by the subscriber to convey
bandwidth management needs to base station
 Bandwidth request header – used by subscriber to
request additional bandwidth
 Payload – either higher-level data or a MAC
control message
 CRC – error-detecting code
MAC Management Messages
 Uplink and downlink channel descriptor
 Uplink and downlink access definition
 Ranging request and response
 Registration request, response and acknowledge
 Privacy key management request and response
 Dynamic service addition request, response and
acknowledge
MAC Management Messages
 Dynamic service change request, response,
and acknowledge
 Dynamic service deletion request and
response
 Multicast polling assignment request and
response
 Downlink data grant type request
 ARQ acknowledgment
Physical Layer – Upstream
Transmission
 Uses a DAMA-TDMA technique
 Error correction uses Reed-Solomon code
 Modulation scheme based on QPSK
Physical Layer – Downstream
Transmission
 Continuous downstream mode
 For continuous transmission stream (audio, video)
 Simple TDM scheme is used for channel access
 Duplexing technique is frequency division duplex
(FDD)
 Burst downstream mode
 Targets burst transmission stream (IP-based traffic)
 DAMA-TDMA scheme is used for channel access
 Duplexing techniques are FDD with adaptive
modulation, frequency shift division duplexing
(FSDD), time division duplexing (TDD)

More Related Content

Similar to Cordless Systems and Wireless Local Loop Technologies Explained

MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSKathirvel Ayyaswamy
 
Circuit Packet
Circuit PacketCircuit Packet
Circuit PacketWaqas !!!!
 
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan ProfArshadAbbas
 
OFDM and MC-CDMA An Implementation using MATLAB.ppt
OFDM and MC-CDMA An Implementation using MATLAB.pptOFDM and MC-CDMA An Implementation using MATLAB.ppt
OFDM and MC-CDMA An Implementation using MATLAB.pptStefan Oprea
 
Sonet Sdh Dwdm
Sonet Sdh DwdmSonet Sdh Dwdm
Sonet Sdh Dwdmdeven l
 
Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5Randa Elanwar
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Chyon Ju
 
Wifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter GreenWifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter GreenEngineers Australia
 
Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Soumen Santra
 

Similar to Cordless Systems and Wireless Local Loop Technologies Explained (20)

MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
 
Circuit Packet
Circuit PacketCircuit Packet
Circuit Packet
 
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
 
OFDM and MC-CDMA An Implementation using MATLAB.ppt
OFDM and MC-CDMA An Implementation using MATLAB.pptOFDM and MC-CDMA An Implementation using MATLAB.ppt
OFDM and MC-CDMA An Implementation using MATLAB.ppt
 
OFDM-5.ppt
OFDM-5.pptOFDM-5.ppt
OFDM-5.ppt
 
Sonet Sdh Dwdm
Sonet Sdh DwdmSonet Sdh Dwdm
Sonet Sdh Dwdm
 
2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
MIMO in 15 minutes
MIMO in 15 minutesMIMO in 15 minutes
MIMO in 15 minutes
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5Data Communications (under graduate course) Lecture 4 of 5
Data Communications (under graduate course) Lecture 4 of 5
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Report
ReportReport
Report
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
 
7 multiplexing
7 multiplexing7 multiplexing
7 multiplexing
 
Wifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter GreenWifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter Green
 
Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Cordless Systems and Wireless Local Loop Technologies Explained

  • 1. Cordless Systems and Wireless Local Loop Chapter 11
  • 2. Cordless System Operating Environments  Residential – a single base station can provide in-house voice and data support  Office  A single base station can support a small office  Multiple base stations in a cellular configuration can support a larger office  Telepoint – a base station set up in a public place, such as an airport
  • 3. Design Considerations for Cordless Standards  Modest range of handset from base station, so low-power designs are used  Inexpensive handset and base station, dictating simple technical approaches  Frequency flexibility is limited, so the system needs to be able to seek a low- interference channel whenever used
  • 4. Time Division Duplex (TDD)  TDD also known as time-compression multiplexing (TCM)  Data transmitted in one direction at a time, with transmission between the two directions  Simple TDD  TDMA TDD
  • 5. Simple TDD  Bit stream is divided into equal segments, compressed in time to a higher transmission rate, and transmitted in bursts  Effective bits transmitted per second: R = B/2(Tp+Tb+Tg)  R = effective data rate  B = size of block in bits  Tp = propagation delay  Tb = burst transmission time  Tg = guard time
  • 6. Simple TDD  Actual data rate, A: A = B /Tb  Combined with previous equation:  The actual data rate is more than double the effective data rate seen by the two sides            b g p T T T R A 1 2
  • 7. TDMA TDD  Wireless TDD typically used with TDMA  A number of users receive forward channel signals in turn and then transmit reverse channel signals in turn, all on same carrier frequency  Advantages of TDMA/TDD:  Improved ability to cope with fast fading  Improved capacity allocation
  • 8. DECT Frame Format  Preamble (16 bits) – alert receiver  Sync (16 bits) – enable receiver to synchronize on beginning of time slot  A field (64 bits) – used for network control  B field (320 bits) – contains user data  X field (4 bits) – parity check bits  Guard (60 bits) – guard time, Tg
  • 9. A Field Logical Control Channels  Q channel – used to broadcast general system information from base station to all terminals  P channel – provides paging from the base station to terminals  M channel – used by terminal to exchange medium access control messages with base station  N channel – provides handshaking protocol  C channel – provides call management for active connections
  • 10. B Field  B field transmits data in two modes  Unprotected mode - used to transmit digitized voice  Protected mode - transmits nonvoice data traffic
  • 12. DECT Protocol Architecture  Physical layer – data transmitted in TDMA-TDD frames over one of 10 RF carriers  Medium access control (MAC) layer – selects/ establishes/releases connections on physical channels; supports three services:  Broadcast  Connection oriented  Connectionless  Data link control layer – provides for the reliable transmission of messages using traditional data link control procedures
  • 13. Differential Quantization  Speech signals tend not to change much between two samples  Transmitted PCM values contain considerable redundancy  Transmit difference value between adjacent samples rather than actual value  If difference value between two samples exceeds transmitted bits, receiver output will drift from the true value  Encoder could replicate receiver output and additionally transmit that difference
  • 14. Differential PCM (DPCM)  Since voice signals change relatively slowly, value of kth sample can be estimated by preceding samples  Transmit difference between sample and estimated sample  Difference value should be less than difference between successive samples  At the receiver, incoming difference value is added to the estimate of the current sample  Same estimation function is used
  • 15. Adaptive Differential PCM (ADPCM)  Improve DPCM performance using adaptive prediction and quantization  Predictor and difference quantizer adapt to the changing characteristics of the speech  Modules  Adaptive quantizer  Inverse adaptive quantizer  Adaptive predictor
  • 18. Subject Measurement of Coder Performance  Subjective measurements of quality are more relevant than objective measures  Mean opinion score (MOS) – group of subjects listen to a sample of coded speech; classify output on a 5-point scale  MOS scale is used in a number of specifications as a standard for quality
  • 19. Wireless Local Loop  Wired technologies responding to need for reliable, high-speed access by residential, business, and government subscribers  ISDN, xDSL, cable modems  Increasing interest shown in competing wireless technologies for subscriber access  Wireless local loop (WLL)  Narrowband – offers a replacement for existing telephony services  Broadband – provides high-speed two-way voice and data service
  • 21. Advantages of WLL over Wired Approach  Cost – wireless systems are less expensive due to cost of cable installation that’s avoided  Installation time – WLL systems can be installed in a small fraction of the time required for a new wired system  Selective installation – radio units installed for subscribers who want service at a given time  With a wired system, cable is laid out in anticipation of serving every subscriber in a given area
  • 22. Propagation Considerations for WLL  Most high-speed WLL schemes use millimeter wave frequencies (10 GHz to about 300 GHz)  There are wide unused frequency bands available above 25 GHz  At these high frequencies, wide channel bandwidths can be used, providing high data rates  Small size transceivers and adaptive antenna arrays can be used
  • 23. Propagation Considerations for WLL  Millimeter wave systems have some undesirable propagation characteristics  Free space loss increases with the square of the frequency; losses are much higher in millimeter wave range  Above 10 GHz, attenuation effects due to rainfall and atmospheric or gaseous absorption are large  Multipath losses can be quite high
  • 24. Fresnel Zone  How much space around direct path between transmitter and receiver should be clear of obstacles?  Objects within a series of concentric circles around the line of sight between transceivers have constructive/destructive effects on communication  For point along the direct path, radius of first Fresnel zone:  S = distance from transmitter  D = distance from receiver D S SD R   
  • 25. Atmospheric Absorption  Radio waves at frequencies above 10 GHz are subject to molecular absorption  Peak of water vapor absorption at 22 GHz  Peak of oxygen absorption near 60 GHz  Favorable windows for communication:  From 28 GHz to 42 GHz  From 75 GHz to 95 GHz
  • 26. Effect of Rain  Attenuation due to rain  Presence of raindrops can severely degrade the reliability and performance of communication links  The effect of rain depends on drop shape, drop size, rain rate, and frequency  Estimated attenuation due to rain:  A = attenuation (dB/km)  R = rain rate (mm/hr)  a and b depend on drop sizes and frequency b aR A 
  • 27. Effects of Vegetation  Trees near subscriber sites can lead to multipath fading  Multipath effects from the tree canopy are diffraction and scattering  Measurements in orchards found considerable attenuation values when the foliage is within 60% of the first Fresnel zone  Multipath effects highly variable due to wind
  • 28. Multipoint Distribution Service (MDS)  Multichannel multipoint distribution service (MMDS)  Also referred to as wireless cable  Used mainly by residential subscribers and small businesses  Local multipoint distribution service (LMDS)  Appeals to larger companies with greater bandwidth demands
  • 29. Advantages of MMDS  MMDS signals have larger wavelengths and can travel farther without losing significant power  Equipment at lower frequencies is less expensive  MMDS signals don't get blocked as easily by objects and are less susceptible to rain absorption
  • 30. Advantages of LMDS  Relatively high data rates  Capable of providing video, telephony, and data  Relatively low cost in comparison with cable alternatives
  • 31. 802.16 Standards Development  Use wireless links with microwave or millimeter wave radios  Use licensed spectrum  Are metropolitan in scale  Provide public network service to fee-paying customers  Use point-to-multipoint architecture with stationary rooftop or tower-mounted antennas
  • 32. 802.16 Standards Development  Provide efficient transport of heterogeneous traffic supporting quality of service (QoS)  Use wireless links with microwave or millimeter wave radios  Are capable of broadband transmissions (>2 Mbps)
  • 34. Protocol Architecture  Physical and transmission layer functions:  Encoding/decoding of signals  Preamble generation/removal  Bit transmission/reception  Medium access control layer functions:  On transmission, assemble data into a frame with address and error detection fields  On reception, disassemble frame, and perform address recognition and error detection  Govern access to the wireless transmission medium
  • 35. Protocol Architecture  Convergence layer functions:  Encapsulate PDU framing of upper layers into native 802.16 MAC/PHY frames  Map upper layer’s addresses into 802.16 addresses  Translate upper layer QoS parameters into native 802.16 MAC format  Adapt time dependencies of upper layer traffic into equivalent MAC service
  • 36. IEEE 802.16.1 Services  Digital audio/video multicast  Digital telephony  ATM  Internet protocol  Bridged LAN  Back-haul  Frame relay
  • 37. IEEE 802.16.3 Services  Voice transport  Data transport  Bridged LAN
  • 39. IEEE 802.16.1 Frame Format  Header - protocol control information  Downlink header – used by the base station  Uplink header – used by the subscriber to convey bandwidth management needs to base station  Bandwidth request header – used by subscriber to request additional bandwidth  Payload – either higher-level data or a MAC control message  CRC – error-detecting code
  • 40. MAC Management Messages  Uplink and downlink channel descriptor  Uplink and downlink access definition  Ranging request and response  Registration request, response and acknowledge  Privacy key management request and response  Dynamic service addition request, response and acknowledge
  • 41. MAC Management Messages  Dynamic service change request, response, and acknowledge  Dynamic service deletion request and response  Multicast polling assignment request and response  Downlink data grant type request  ARQ acknowledgment
  • 42. Physical Layer – Upstream Transmission  Uses a DAMA-TDMA technique  Error correction uses Reed-Solomon code  Modulation scheme based on QPSK
  • 43. Physical Layer – Downstream Transmission  Continuous downstream mode  For continuous transmission stream (audio, video)  Simple TDM scheme is used for channel access  Duplexing technique is frequency division duplex (FDD)  Burst downstream mode  Targets burst transmission stream (IP-based traffic)  DAMA-TDMA scheme is used for channel access  Duplexing techniques are FDD with adaptive modulation, frequency shift division duplexing (FSDD), time division duplexing (TDD)