The document describes the fundamentals of WCDMA radio access networks. It covers topics such as wireless signal propagation, CDMA principles including spreading and despreading, channel coding, and modulation techniques used in WCDMA like QPSK. It also discusses concepts like channelization codes, scrambling codes and the use of a RAKE receiver to mitigate multipath fading in WCDMA systems.
This second webinar discusses LTE Air Interface, the link between a mobile device and the network, and a fundamental driver of the quality of the network.
This second webinar discusses LTE Air Interface, the link between a mobile device and the network, and a fundamental driver of the quality of the network.
This third webinar discusses the fundamentals of LTE Carriers and how LTE mobiles communicate with the network including what factors affect performance.
the development of mobile communication system
the structure of CDMA2000 network
the number planning in CDMA2000 network
the techniques used by CDMA system including:
source coding, channel coding, interleaving, scrambling, spreading and modulation etc.
power control, soft handoff, RAKE receiver
F-PCH,F-PICH,F-SYNCH,F-FCH,F-SCH,R-ACH,R-PICH
Long code, short code and Walsh code
Chapter 1: Introduction
Chapter 2: CDMA Techniques & Technologies
Chapter 3: CDMA Air Interface
Chapter 4: CDMA Number Planning
The ODC2 is a multi-rate SONET/SDH, GbE, and Fibre Channel transponder that provides secure access to DWDM networks and extends the reach of standard fiber connections. Secure transport of services is provided with state of the art AES-256 encryption based on NIST standards. Key exchanges are performed securely over public or private networks using the Diffie-Hellman algorithm.
The SN-ODC2 supports 4G & 8G Fibre Channel and 10G Ethernet Data rates. Forward Error Correction and 3R (reshaping, regeneration, re-timing) features also make the ODC2 line card cost and space effective for transport-layer regeneration applications. Tunable SFP+ optics support 80 DWDM channels.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Assuring Contact Center Experiences for Your Customers With ThousandEyes
01 owa200002 wcdma ran fundamental
1. 1
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved
www.huawei.com
OWA200002 WCDMA
RAN Fundamental
ISSUE1.1
HUAWEI TECHNOLOGIES CO., LTD. Page 2All rights reserved
Upon completion of this course, you will be able to:
[ Describe feature of wireless propagation
[ Outline the advantage of CDMA principle
[ Characterize code sequence
[ Outline the fundamentals of RAN
2. 2
HUAWEI TECHNOLOGIES CO., LTD. Page 3All rights reserved
Chapter 1 CDMA PrincipleChapter 1 CDMA Principle
Chapter 2 WCDMA FundamentalChapter 2 WCDMA Fundamental
HUAWEI TECHNOLOGIES CO., LTD. Page 4All rights reserved
Wireless Propagation
Time
Received
signal
Transmitted
signal
Transmission Loss:
path loss
multi-path fading
4. 4
HUAWEI TECHNOLOGIES CO., LTD. Page 7All rights reserved
Multiple Access Technology and Duplex Technology
l Multiple access technology
[ Time division multiple access (TDMA)
[ Frequency division multiple access (FDMA)
[ Code division multiple access (CDMA)
l Duplex technology
[ Time division duplex (TDD)
[ Frequency division duplex (FDD)
HUAWEI TECHNOLOGIES CO., LTD. Page 8All rights reserved
Multiple Access Technology
frequency
time
power
FDMA
frequencytime
power
TDMA
power
time
CDMA
frequency
5. 5
HUAWEI TECHNOLOGIES CO., LTD. Page 9All rights reserved
Duplex Technology
FDD
Time
Frequency
Power
UL DL
UMTS USER 1
UMTS USER 2
Time
Frequency
Power
TDD
UMTS USER 2
UMTS USER 1
DL
UL
DL
DL
UL
HUAWEI TECHNOLOGIES CO., LTD. Page 10All rights reserved
Chapter 1 CDMA PrincipleChapter 1 CDMA Principle
Chapter 2 WCDMA FundamentalChapter 2 WCDMA Fundamental
6. 6
HUAWEI TECHNOLOGIES CO., LTD. Page 11All rights reserved
Processing Procedure of WCDMA System
Source
coding
Channel
coding
Spreading Modulation
Source
decoding
Channel
decoding
Despreading Demodulation
Radio channelRadio channelRadio channel
Transmission
Reception
Coding of
information using
the smallest
amount of bits
possible
Adding
redundancy
to protect the
information
Transmission
of a physical
signal
Spreading
chip modulated signal
bit symbol
HUAWEI TECHNOLOGIES CO., LTD. Page 12All rights reserved
Terms
l Bit, Symbol, Chip
[ Bit : data after source coding
[ Symbol: data after channel coding and interleaving
[ Chip: data after spreading
l Process Gain: 10log (chip rate/ bit rate)
[ for different service, the Gain is different
[ Process Gain is smaller, UE need more power for this service
[ Process Gain is smaller, the coverage of the service is smaller
7. 7
HUAWEI TECHNOLOGIES CO., LTD. Page 13All rights reserved
WCDMA Source Coding
lAMR (Adaptive Multi-Rate) voice coding
[Multi-rate
− 8 kinds of coding rates
[Adaptation:
− when cell load increases, the system will
decrease speech rate of part of
subscribers automatically so as to
support more subscribers
5.15AMR_5.15
1.8AMR_SID
4.75AMR_4.75
5.9AMR_5.90
6.7 (PDC EFR)AMR_6.70
7.4 (TDMA EFR)AMR_7.40
7.95AMR_7.95
10.2AMR_10.20
12.2 (GSM EFR)AMR_12.20
Bit rate (kbps)CODEC
HUAWEI TECHNOLOGIES CO., LTD. Page 14All rights reserved
WCDMA Channel Coding
l Purpose
[ Enhance the correlation among symbols so as to recover the signal
when interference occurs
l Types
[ Convolutional coding produces ‘redundant’ copies of bits
− Provides better error correction at receiving end
− Increases the delay
[ Turbo Coding
8. 8
HUAWEI TECHNOLOGIES CO., LTD. Page 15All rights reserved
WCDMA Interleaving
1110
1.........
............
...000
0100
0 0 1 0 0 0 0 . . . 1 0 1 1 1
1110
1.........
............
...000
0010
0 0 … 0 1 0 … 1 0 0 … 1 0 … 1 1
Inter-column
permutation
Output bits
Input bits
Interleaving periods:
10, 20, 40, or 80 ms
l Interleaving ‘spreads out’ consecutive bits in time
l Reduces the probability of losing consecutive bits
[ Convolutional encoding is sensitive to consecutive bit loss
l Trades delay time for data protection
[ Longer interleaving periods have better data protection with more delay
HUAWEI TECHNOLOGIES CO., LTD. Page 16All rights reserved
Correlation
l Correlation is a measure of similarity of between any two arbitrary signals
l Auto Correlation is related to the multi-path interference characteristic
l Cross Correlation is related to the multi-user interference characteristic
Time delay
9. 9
HUAWEI TECHNOLOGIES CO., LTD. Page 17All rights reserved
Channelization Code – OVSF Code
l OVSF Code: Orthogonal Variable Spreading Factor Code
l SF = chip rate / bit rate
[High data rates: low SF
[Low data rates: high SF
SF = 1 SF = 2 SF = 4
Cch,1,0 = (1)
Cch,2,0 = (1,1)
Cch,2,1 = (1,-1)
Cch,4,0 =(1,1,1,1)
Cch,4,1 = (1,1,-1,-1)
Cch,4,2 = (1,-1,1,-1)
Cch,4,3 = (1,-1,-1,1)
SF = 8 to 512
HUAWEI TECHNOLOGIES CO., LTD. Page 18All rights reserved
Purpose of Channelization Code
l For uplink, Channelization code ( OVSF code ) is used to separate
different physical channels of one connection
l For downlink, Channelization code ( OVSF code ) is used to separate
different connections in a cell
32Speech 12.2 + Data 64 kbps DL16Data 128 kbps DL
16Speech 12.2 + Data 64 kbps UL8Data 128 kbps UL
8Data 2048 kbps DL32Data 64 kbps DL
4Data 2048 kbps UL16Data 64 kbps UL
8Data 384 kbps DL256Speech 4.75 DL
4Data 384 kbps UL128Speech 4.75 UL
16Data 144 kbps DL128Speech 12.2 DL
8Data 144 kbps UL64Speech 12.2 UL
SFRadio bearer**SFRadio bearer**
** With 3.4 kbps Signaling
10. 10
HUAWEI TECHNOLOGIES CO., LTD. Page 19All rights reserved
Scrambling Code – Gold Sequence
l Scrambling codes Properties
[ 38 400 chip long sequences
[ Repeated every 10 ms
[ Coming from Pseudo Noise sequences
l For uplink, Scrambling code ( Gold sequence ) is used to separate
different connection
l For downlink, Scrambling code ( Gold sequence ) is used to separate
different cell
clong,1,n
clong,2,n
MSB LSB
scrambling sequence generator
HUAWEI TECHNOLOGIES CO., LTD. Page 20All rights reserved
Code Multiplexing
l Downlink Transmission on a Cell Level
Scrambling code
Channelization code 1
Channelization code 2
Channelization code 3
User 1 signal
User 2 signal
User 3 signal
NodeB
12. 12
HUAWEI TECHNOLOGIES CO., LTD. Page 23All rights reserved
Despreading
UE1×c1+ UE2×c2: 0 -2 0 -2 0 +2 0 +2
UE1 Dispreading by c1: +1 -1 +1 -1 +1 -1 +1 -1
Dispreading result: 0 +2 0 +2 0 -2 0 -2
Integral judgment: +4 (means+1) -4 (means-1)
UE2 Dispreading by c2: +1 +1 +1 +1 +1 +1 +1 +1
Dispreading result: 0 -2 0 -2 0 +2 0 +2
Integral judgment: -4 (means-1) +4 (means+1)
UE1×c1+ UE2×c2: 0 -2 0 -2 0 +2 0 +2
UE1 Dispreading by c1: +1 -1 +1 -1 +1 -1 +1 -1
Dispreading result: 0 +2 0 +2 0 -2 0 -2
Integral judgment: +4 (means+1) -4 (means-1)
UE2 Dispreading by c2: +1 +1 +1 +1 +1 +1 +1 +1
Dispreading result: 0 -2 0 -2 0 +2 0 +2
Integral judgment: -4 (means-1) +4 (means+1)
HUAWEI TECHNOLOGIES CO., LTD. Page 24All rights reserved
Spreading
Despreading
Chip
Symbol
Data
Spreading code
Spreading signal
=Data×code
Data
=Spreading×code
1
-1
1
-1
1
-1
1
-1
1
-1
Known code
at receiver
Spreading and Despreading
Correlation at a CDMA receiver
Correlation at a CDMA receiver
13. 13
HUAWEI TECHNOLOGIES CO., LTD. Page 25All rights reserved
Desired signal
Other user’s
signal
Desired spreading
signal
Spreading code
Data after
despreading
Other spreading
signal
Other signal after
integration
1
-1
1
-1
1
-1
8
-8
1
-1
8
-8
Data after
integration
Other signal after
despreading
Spreading and Despreading
Correlation at a CDMA receiver
Correlation with incorrect code
HUAWEI TECHNOLOGIES CO., LTD. Page 26All rights reserved
Modulation Overview
1 00 1
time
Basic steady radio
wave:
carrier = A.cos(2πFt+φ)
Amplitude Shift
Keying:
A.cos(2πFt+φ)
Frequency Shift
Keying:
A.cos(2πFt+φ)
Phase Shift Keying:
A.cos(2πFt+φ)
Data to be transmitted:
Digital Input
14. 14
HUAWEI TECHNOLOGIES CO., LTD. Page 27All rights reserved
Modulation Overview
l Digital Modulation - BPSK
1
t
1 10
1
t
-1
NRZ coding
fo
BPSK
Modulated
BPSK
signal
Carrier
Information
signal
φ=0 φ=π φ=0
1 102 3 4 9875 6
1 102 3 4 9875 6
Digital Input
High Frequency
Carrier
BPSK Waveform
HUAWEI TECHNOLOGIES CO., LTD. Page 28All rights reserved
Modulation Review
l Digital Modulation - QPSK
-1 -1
1 102 3 4 9875 6
1 102 3 4 9875 6
NRZ Input
I di-Bit Stream
Q di-Bit Stream
I
Component
Q
Component
QPSK Waveform
1
1
-1
1
-1
1
1
-1
-1
-1
1 1 -1 1 -1 1 1 -1
16. 16
HUAWEI TECHNOLOGIES CO., LTD. Page 31All rights reserved
Principle of RAKE Receiver
Receive set
Correlator 1
Correlator 2
Correlator 3
Searcher correlator Calculate the
time delay and
signal strength
Combiner
The
combined
signal
tt
s(t) s(t)
RAKE receiver help to overcome on the multi-path fading and enhance the receive
performance of the system
HUAWEI TECHNOLOGIES CO., LTD. Page 32All rights reserved
Principle of RAKE Receiver
l The RAKE receiver take advantage of multi-path diversity
l The RAKE receiver processes the received signal
[ Identify the time delay positions at which significant energy arrives
[ Allocate correlation receivers (RAKE fingers) to those peaks
[ Within each Rake finger, track the fast-changing phase and amplitude values
[ Adjust the phase, remove the values originating from fast-fading
[ Combine the demodulated and phase-adjusted symbols across all active fingers
[ Present them to the decoder for further processing
l This processing is called Maximal Ratio Combining
17. 17
HUAWEI TECHNOLOGIES CO., LTD. Page 33All rights reserved
Demodulation
Frequency
translation
Matched
filter
Finger
combination
Despreading Symbol
decision
Fi
Σ
Delay (τn)
Delay (τ1)
Delay (τ0)
Estimated
chips
-1,1
x
Rake receiver
1,1
1,-1-1,-1
www.huawei.com
Thank You