The document provides background information on various wireless technologies including LTE, UMB, and WiMax. It discusses their origins, standards development organizations, key enhancements over time, and speed capabilities. For example, it explains that LTE evolved from GSM/UMTS standards through 3GPP, while UMB originated from CDMA2000/EVDO standards and WiMax came from IEEE 802.16 standards for wireless metropolitan area networks. It provides timelines of developments and comparisons of download/upload speeds for different generations of each technology.
The document summarizes the evolution of multiple access techniques used in mobile communications systems over time. Early systems used simplex or half duplex frequency modulation. Cellular concepts and frequency division duplexing were developed in the 1950s-1960s. The first US cellular system was AMPS in 1983, using FDMA. Later, digital cellular and CDMA were introduced, using time division multiple access and code division multiple access respectively. Multiple access techniques allow sharing of bandwidth among users and include FDMA, TDMA, CDMA and their variations.
multiple access techniques for wireless communicationSajid ali
This document discusses multiple access techniques for wireless communication. It describes three main techniques: frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA). FDMA allocates different frequency bands to different users. TDMA divides the available bandwidth into time slots and allocates slots to users. CDMA spreads user signals using unique codes and allows simultaneous transmission. Common cellular systems that use these techniques include AMPS (FDMA), GSM (TDMA), and IS-95 (CDMA).
The document discusses various multiple access techniques used in wireless networks. It describes Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), Orthogonal Frequency Division Multiplexing (OFDM), and Space Division Multiple Access (SDMA). It also covers concepts like duplexing methods, power control, modulation techniques, and the near-far problem in CDMA systems.
Multiple access techniques allow multiple users to share the same wireless spectrum simultaneously. Common techniques include frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA). FDMA assigns each user a different frequency band. TDMA assigns each user time slots on the same frequency. CDMA spreads each user's signal across the entire frequency band using unique codes.
Multiple access techniques for wireless communicationDr.Umadevi V
This document discusses multiple access techniques for wireless communication. It begins with an introduction to how multiple access schemes allow efficient sharing of limited radio spectrum among multiple users. It then provides a brief history of wireless communication and pioneers. The document goes on to explain various multiple access techniques in detail including FDMA, TDMA, CDMA, SDMA, and CSMA. It describes their applications, advantages, and disadvantages. Forward and reverse link power control in CDMA is also summarized.
Multiple access techniques allow multiple users to share finite radio spectrum resources simultaneously. They can be categorized as narrowband or wideband. Common techniques include FDMA, TDMA, CDMA, and SDMA. FDMA divides the total bandwidth into narrow channels that are allocated to users. TDMA divides each channel into time slots that are allocated to users. CDMA spreads the signal over a wide bandwidth using pseudo-random codes and allows multiple signals to overlap in both time and frequency.
multiple access techniques used in wireless communicationSajid ali
This document discusses multiple access techniques for wireless communication. It describes frequency division duplexing (FDD) and time division duplexing (TDD) for sharing radio spectrum. The main multiple access techniques are described as frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA). FDMA allocates different frequency bands to each user, TDMA divides the available time into time slots and allocates one slot per user, and CDMA uses pseudo-random codes to distinguish users transmitting simultaneously on the same frequency. Common cellular systems like AMPS, GSM, and IS-95 are cited as examples.
The document discusses multiplexing and multiple access techniques. It describes frequency division multiplexing (FDM), time division multiplexing (TDM), code division multiplexing (CDM), and code division multiple access (CDMA). FDM separates a shared transmission medium into different frequency channels. TDM allows multiple signals to share the same transmission medium by dividing the signal into different time slots. CDM uses unique codes to distinguish between signals transmitted over the same shared band. CDMA is a multiple access scheme that uses spread spectrum technology and pseudo-random codes.
The document summarizes the evolution of multiple access techniques used in mobile communications systems over time. Early systems used simplex or half duplex frequency modulation. Cellular concepts and frequency division duplexing were developed in the 1950s-1960s. The first US cellular system was AMPS in 1983, using FDMA. Later, digital cellular and CDMA were introduced, using time division multiple access and code division multiple access respectively. Multiple access techniques allow sharing of bandwidth among users and include FDMA, TDMA, CDMA and their variations.
multiple access techniques for wireless communicationSajid ali
This document discusses multiple access techniques for wireless communication. It describes three main techniques: frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA). FDMA allocates different frequency bands to different users. TDMA divides the available bandwidth into time slots and allocates slots to users. CDMA spreads user signals using unique codes and allows simultaneous transmission. Common cellular systems that use these techniques include AMPS (FDMA), GSM (TDMA), and IS-95 (CDMA).
The document discusses various multiple access techniques used in wireless networks. It describes Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), Orthogonal Frequency Division Multiplexing (OFDM), and Space Division Multiple Access (SDMA). It also covers concepts like duplexing methods, power control, modulation techniques, and the near-far problem in CDMA systems.
Multiple access techniques allow multiple users to share the same wireless spectrum simultaneously. Common techniques include frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA). FDMA assigns each user a different frequency band. TDMA assigns each user time slots on the same frequency. CDMA spreads each user's signal across the entire frequency band using unique codes.
Multiple access techniques for wireless communicationDr.Umadevi V
This document discusses multiple access techniques for wireless communication. It begins with an introduction to how multiple access schemes allow efficient sharing of limited radio spectrum among multiple users. It then provides a brief history of wireless communication and pioneers. The document goes on to explain various multiple access techniques in detail including FDMA, TDMA, CDMA, SDMA, and CSMA. It describes their applications, advantages, and disadvantages. Forward and reverse link power control in CDMA is also summarized.
Multiple access techniques allow multiple users to share finite radio spectrum resources simultaneously. They can be categorized as narrowband or wideband. Common techniques include FDMA, TDMA, CDMA, and SDMA. FDMA divides the total bandwidth into narrow channels that are allocated to users. TDMA divides each channel into time slots that are allocated to users. CDMA spreads the signal over a wide bandwidth using pseudo-random codes and allows multiple signals to overlap in both time and frequency.
multiple access techniques used in wireless communicationSajid ali
This document discusses multiple access techniques for wireless communication. It describes frequency division duplexing (FDD) and time division duplexing (TDD) for sharing radio spectrum. The main multiple access techniques are described as frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA). FDMA allocates different frequency bands to each user, TDMA divides the available time into time slots and allocates one slot per user, and CDMA uses pseudo-random codes to distinguish users transmitting simultaneously on the same frequency. Common cellular systems like AMPS, GSM, and IS-95 are cited as examples.
The document discusses multiplexing and multiple access techniques. It describes frequency division multiplexing (FDM), time division multiplexing (TDM), code division multiplexing (CDM), and code division multiple access (CDMA). FDM separates a shared transmission medium into different frequency channels. TDM allows multiple signals to share the same transmission medium by dividing the signal into different time slots. CDM uses unique codes to distinguish between signals transmitted over the same shared band. CDMA is a multiple access scheme that uses spread spectrum technology and pseudo-random codes.
This document discusses multiple access techniques for wireless communications, including FDMA, TDMA, and CDMA. It provides details on how each technique works and its advantages and disadvantages. FDMA divides the frequency band into channels that can be assigned to individual users. TDMA divides each channel into time slots that can be assigned to users. CDMA allows all users to use the whole available bandwidth simultaneously by using unique codes to distinguish users' signals.
Presentation on MULTIPLE ACCESS TECHNIQUES FOR WIRELESS COMMUNICATION By SUPRIYA BHARATI (ME/EC/10006/16) and KHUSHBOO KUMARI (ME/EC/10010/16) Under the Guidance of Dr. Sanjay Kumar Department of Electronics & Communication Engg. (ECE) Birla Institute of Technology, Mesra ,Ranchi-835215 , Jharkhand , India
Multiple access techniques allow multiple mobile users to simultaneously share a finite amount of radio spectrum for communication. Common techniques include FDMA, TDMA, CDMA, and SDMA. FDMA allocates different frequency bands to different users. TDMA divides the available bandwidth into time slots that are allocated to users. CDMA spreads user signals over the entire available bandwidth through coding.
TDMA allows multiple users to share the same frequency channel by dividing the signal into different time slots. Each user transmits in brief bursts at periodic intervals, with the time slots being allocated so as not to interfere with each other. Key advantages include efficient use of spectrum and ability to carry voice and data. TDMA networks provide approximately three times the voice channel capacity of analog networks.
This document discusses multiple access communication techniques. It introduces frequency division multiple access (FDMA), time division multiple access (TDMA), code division multiple access (CDMA), and space/beam division multiple access (SDMA). FDMA assigns each user a pair of frequencies, TDMA divides bandwidth into time slots and assigns users slots, CDMA allows signals to occupy the same channel using unique codes, and SDMA serves different users using concentrated spot beams. The document provides examples of applications and advantages/disadvantages of each technique.
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONjuhi kumari
Multiple access techniques allow multiple terminals to share access to a transmission medium. The document discusses several techniques: frequency division multiple access (FDMA) allocates different frequencies to different users; time division multiple access (TDMA) divides the time frame into slots and allocates different time slots to different users; code division multiple access (CDMA) allocates different codes to different users; space division multiple access (SDMA) uses directional antennas to spatially separate users. The document also discusses ALOHA, slotted ALOHA, carrier sense multiple access (CSMA), and multiple access collision avoidance (MACA) protocols for wireless networks.
FDMA, TDMA, CDMA, and DAMA are multiple access techniques that allow multiple users to share access to a satellite for communication. FDMA divides the available bandwidth into different frequency channels. TDMA divides the bandwidth into different time slots. CDMA spreads each user's signal over the entire bandwidth using unique codes. DAMA dynamically assigns bandwidth according to demand rather than using pre-assigned blocks of time or frequency. These techniques allow efficient sharing of satellite bandwidth among multiple users.
This document discusses multiple access techniques used in wireless communication systems to allow multiple mobile users to share limited spectrum bandwidth efficiently. It describes frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA) as the three major techniques. FDMA assigns different frequency channels to individual users. TDMA assigns each user a unique time slot on a frequency channel. CDMA spreads user signals over a wide bandwidth using pseudo-random codes.
The document discusses various medium access control (MAC) protocols for wireless networks. It describes challenges with applying carrier sense multiple access with collision detection (CSMA/CD) to wireless networks due to problems like hidden and exposed terminals. It then covers different MAC schemes like space division multiple access (SDMA), frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA) that aim to address these challenges. Specific protocols discussed in more detail include Aloha, slotted Aloha, and how TDMA can be used for fixed or dynamic channel allocation.
This document discusses multiple access techniques for wireless communication, including Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), and Code Division Multiple Access (CDMA). It describes the basic concepts of each technique, including how they divide up frequency bands, time slots, or codes to allow multiple users to access a shared radio channel simultaneously. The document also provides examples of cellular systems that use each type of multiple access technique, such as Advanced Mobile Phone System (AMPS) using FDMA/FDD and Global System for Mobile (GSM) using TDMA/FDD. It defines terms like frame efficiency that describe how effectively each technique utilizes available resources.
Frequency Division Multiple Access (FDMA) is a channel access method where the available bandwidth is divided into multiple non-overlapping frequency bands and each user is assigned a specific frequency band. Each user can transmit or receive independently in its assigned frequency band without interference from other users. FDMA requires expensive bandpass filters for each frequency band and has strict linearity requirements for the transmission medium. The number of channels in an FDMA system is calculated by dividing the total available bandwidth minus the guard bands by the bandwidth of each individual channel.
This document discusses multiple access techniques used in satellite communication. It describes four main techniques: frequency division multiple access (FDMA), time division multiple access (TDMA), code division multiple access (CDMA), and space division multiple access (SDMA). For each technique, it provides details on how multiple users can access the satellite transponder bandwidth simultaneously, including dividing the bandwidth by frequency, time, code, or antenna beam polarization. It also compares FDMA and TDMA, discussing their differences and providing examples of each.
This document discusses FDMA (Frequency Division Multiple Access), a method of multiple access where a given radio frequency bandwidth is divided into smaller frequency bands. Each user is allocated a unique frequency band or channel. The key advantages of FDMA are that it does not require base station control, data transmission will not be lost, and it has simple channel operations. However, disadvantages include the inability of stations to receive from multiple sources, fixed and small data rates per channel, and wasted capacity from guard bands.
This document discusses space division multiplexing (SDM), a new technique for fiber optic communication that increases transmission capacity. SDM utilizes unused space within the core or additional fiber cores to establish independent transmission channels. There are two main SDM strategies: multi-core fiber which has multiple cores embedded in the cladding, and multi-mode fiber which supports propagation of multiple independent modes within a single core. SDM provides significant advantages like high scalability and the ability to achieve terabit per second throughput. When combined with software defined networking, SDM networks also enable efficient infrastructure utilization and flexible bandwidth provisioning. However, SDM also faces challenges like crosstalk between cores and high insertion losses.
TDMA (Time Division Multiple Access) is a digital transmission technology that allows multiple users to share the same frequency channel by dividing the signal into different time slots. It allocates a single frequency channel for a short time and then switches to another channel, with the digital samples from a single transmitter occupying different time slots across several frequency bands simultaneously. The current TDMA standard for cellular divides each channel into six time slots, with each signal using two slots, providing three times the capacity of earlier analog cellular standards.
This presentation based on TDMA technology,How it works,comparison between TDMA,FDMA,CDMA,Advantages and disadvantages of TDMA,Synchronization of TDMA and Evolution of TDMA
CDMA is a digital cellular standard that allows multiple users to access the same radio frequency channel simultaneously through the use of unique code sequences. Users are separated by spreading their transmitted signals across the frequency band using pseudo-random codes. CDMA provides advantages over other multiple access techniques like FDMA and TDMA such as increased capacity, soft handoffs between cells, and covert operation due to its noise-like signals. The IS-95 standard introduced CDMA to cellular networks and specified the use of orthogonal codes to separate signals and a 1.25 MHz channel bandwidth to support multiple simultaneous voice calls.
This document discusses multiplexing techniques used in mobile computing. It describes four types of multiplexing: frequency division multiplexing (FDM), time division multiplexing (TDM), code division multiplexing (CDM), and space division multiplexing (SDM). For each type, it provides details on how the technique works and its advantages and disadvantages. FDM uses different frequencies to transmit multiple signals simultaneously. TDM divides a signal into time slots to share a frequency. CDM assigns unique codes to signals sharing the same frequency. SDM splits a channel across physical locations.
This document provides an overview of mobile computing technologies including GSM, GPRS, CDMA, and WLANs. It discusses the objectives and history of GSM and describes its architecture and evolution. Key features of GPRS are outlined including its use of packet data networks. The document also summarizes CDMA technology, highlighting its use of code division multiple access. Advantages and disadvantages of WLANs are presented. Finally, the document defines global mobile satellite systems and discusses their benefits and drawbacks for communication.
This document discusses the evolution of cellular networks from early 1G analog networks through 2G and 3G digital networks. It describes the standards and technologies involved in 3G networks, including W-CDMA, CDMA2000, and improvements in data speeds. The document also discusses the composition and standards for 4G networks, including requirements for high quality of service and spectrum needs. Implementation of 4G will involve new all-IP networks based on technologies like LTE and WiMax to support higher data rates.
This document discusses multiple access techniques for wireless communications, including FDMA, TDMA, and CDMA. It provides details on how each technique works and its advantages and disadvantages. FDMA divides the frequency band into channels that can be assigned to individual users. TDMA divides each channel into time slots that can be assigned to users. CDMA allows all users to use the whole available bandwidth simultaneously by using unique codes to distinguish users' signals.
Presentation on MULTIPLE ACCESS TECHNIQUES FOR WIRELESS COMMUNICATION By SUPRIYA BHARATI (ME/EC/10006/16) and KHUSHBOO KUMARI (ME/EC/10010/16) Under the Guidance of Dr. Sanjay Kumar Department of Electronics & Communication Engg. (ECE) Birla Institute of Technology, Mesra ,Ranchi-835215 , Jharkhand , India
Multiple access techniques allow multiple mobile users to simultaneously share a finite amount of radio spectrum for communication. Common techniques include FDMA, TDMA, CDMA, and SDMA. FDMA allocates different frequency bands to different users. TDMA divides the available bandwidth into time slots that are allocated to users. CDMA spreads user signals over the entire available bandwidth through coding.
TDMA allows multiple users to share the same frequency channel by dividing the signal into different time slots. Each user transmits in brief bursts at periodic intervals, with the time slots being allocated so as not to interfere with each other. Key advantages include efficient use of spectrum and ability to carry voice and data. TDMA networks provide approximately three times the voice channel capacity of analog networks.
This document discusses multiple access communication techniques. It introduces frequency division multiple access (FDMA), time division multiple access (TDMA), code division multiple access (CDMA), and space/beam division multiple access (SDMA). FDMA assigns each user a pair of frequencies, TDMA divides bandwidth into time slots and assigns users slots, CDMA allows signals to occupy the same channel using unique codes, and SDMA serves different users using concentrated spot beams. The document provides examples of applications and advantages/disadvantages of each technique.
MULTIPLE ACCESS IN WIRELESS COMMUNICATIONjuhi kumari
Multiple access techniques allow multiple terminals to share access to a transmission medium. The document discusses several techniques: frequency division multiple access (FDMA) allocates different frequencies to different users; time division multiple access (TDMA) divides the time frame into slots and allocates different time slots to different users; code division multiple access (CDMA) allocates different codes to different users; space division multiple access (SDMA) uses directional antennas to spatially separate users. The document also discusses ALOHA, slotted ALOHA, carrier sense multiple access (CSMA), and multiple access collision avoidance (MACA) protocols for wireless networks.
FDMA, TDMA, CDMA, and DAMA are multiple access techniques that allow multiple users to share access to a satellite for communication. FDMA divides the available bandwidth into different frequency channels. TDMA divides the bandwidth into different time slots. CDMA spreads each user's signal over the entire bandwidth using unique codes. DAMA dynamically assigns bandwidth according to demand rather than using pre-assigned blocks of time or frequency. These techniques allow efficient sharing of satellite bandwidth among multiple users.
This document discusses multiple access techniques used in wireless communication systems to allow multiple mobile users to share limited spectrum bandwidth efficiently. It describes frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA) as the three major techniques. FDMA assigns different frequency channels to individual users. TDMA assigns each user a unique time slot on a frequency channel. CDMA spreads user signals over a wide bandwidth using pseudo-random codes.
The document discusses various medium access control (MAC) protocols for wireless networks. It describes challenges with applying carrier sense multiple access with collision detection (CSMA/CD) to wireless networks due to problems like hidden and exposed terminals. It then covers different MAC schemes like space division multiple access (SDMA), frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA) that aim to address these challenges. Specific protocols discussed in more detail include Aloha, slotted Aloha, and how TDMA can be used for fixed or dynamic channel allocation.
This document discusses multiple access techniques for wireless communication, including Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), and Code Division Multiple Access (CDMA). It describes the basic concepts of each technique, including how they divide up frequency bands, time slots, or codes to allow multiple users to access a shared radio channel simultaneously. The document also provides examples of cellular systems that use each type of multiple access technique, such as Advanced Mobile Phone System (AMPS) using FDMA/FDD and Global System for Mobile (GSM) using TDMA/FDD. It defines terms like frame efficiency that describe how effectively each technique utilizes available resources.
Frequency Division Multiple Access (FDMA) is a channel access method where the available bandwidth is divided into multiple non-overlapping frequency bands and each user is assigned a specific frequency band. Each user can transmit or receive independently in its assigned frequency band without interference from other users. FDMA requires expensive bandpass filters for each frequency band and has strict linearity requirements for the transmission medium. The number of channels in an FDMA system is calculated by dividing the total available bandwidth minus the guard bands by the bandwidth of each individual channel.
This document discusses multiple access techniques used in satellite communication. It describes four main techniques: frequency division multiple access (FDMA), time division multiple access (TDMA), code division multiple access (CDMA), and space division multiple access (SDMA). For each technique, it provides details on how multiple users can access the satellite transponder bandwidth simultaneously, including dividing the bandwidth by frequency, time, code, or antenna beam polarization. It also compares FDMA and TDMA, discussing their differences and providing examples of each.
This document discusses FDMA (Frequency Division Multiple Access), a method of multiple access where a given radio frequency bandwidth is divided into smaller frequency bands. Each user is allocated a unique frequency band or channel. The key advantages of FDMA are that it does not require base station control, data transmission will not be lost, and it has simple channel operations. However, disadvantages include the inability of stations to receive from multiple sources, fixed and small data rates per channel, and wasted capacity from guard bands.
This document discusses space division multiplexing (SDM), a new technique for fiber optic communication that increases transmission capacity. SDM utilizes unused space within the core or additional fiber cores to establish independent transmission channels. There are two main SDM strategies: multi-core fiber which has multiple cores embedded in the cladding, and multi-mode fiber which supports propagation of multiple independent modes within a single core. SDM provides significant advantages like high scalability and the ability to achieve terabit per second throughput. When combined with software defined networking, SDM networks also enable efficient infrastructure utilization and flexible bandwidth provisioning. However, SDM also faces challenges like crosstalk between cores and high insertion losses.
TDMA (Time Division Multiple Access) is a digital transmission technology that allows multiple users to share the same frequency channel by dividing the signal into different time slots. It allocates a single frequency channel for a short time and then switches to another channel, with the digital samples from a single transmitter occupying different time slots across several frequency bands simultaneously. The current TDMA standard for cellular divides each channel into six time slots, with each signal using two slots, providing three times the capacity of earlier analog cellular standards.
This presentation based on TDMA technology,How it works,comparison between TDMA,FDMA,CDMA,Advantages and disadvantages of TDMA,Synchronization of TDMA and Evolution of TDMA
CDMA is a digital cellular standard that allows multiple users to access the same radio frequency channel simultaneously through the use of unique code sequences. Users are separated by spreading their transmitted signals across the frequency band using pseudo-random codes. CDMA provides advantages over other multiple access techniques like FDMA and TDMA such as increased capacity, soft handoffs between cells, and covert operation due to its noise-like signals. The IS-95 standard introduced CDMA to cellular networks and specified the use of orthogonal codes to separate signals and a 1.25 MHz channel bandwidth to support multiple simultaneous voice calls.
This document discusses multiplexing techniques used in mobile computing. It describes four types of multiplexing: frequency division multiplexing (FDM), time division multiplexing (TDM), code division multiplexing (CDM), and space division multiplexing (SDM). For each type, it provides details on how the technique works and its advantages and disadvantages. FDM uses different frequencies to transmit multiple signals simultaneously. TDM divides a signal into time slots to share a frequency. CDM assigns unique codes to signals sharing the same frequency. SDM splits a channel across physical locations.
This document provides an overview of mobile computing technologies including GSM, GPRS, CDMA, and WLANs. It discusses the objectives and history of GSM and describes its architecture and evolution. Key features of GPRS are outlined including its use of packet data networks. The document also summarizes CDMA technology, highlighting its use of code division multiple access. Advantages and disadvantages of WLANs are presented. Finally, the document defines global mobile satellite systems and discusses their benefits and drawbacks for communication.
This document discusses the evolution of cellular networks from early 1G analog networks through 2G and 3G digital networks. It describes the standards and technologies involved in 3G networks, including W-CDMA, CDMA2000, and improvements in data speeds. The document also discusses the composition and standards for 4G networks, including requirements for high quality of service and spectrum needs. Implementation of 4G will involve new all-IP networks based on technologies like LTE and WiMax to support higher data rates.
This document discusses the evolution of cellular networks from early 1G analog networks through 2G and 3G digital standards. It describes how 3G networks provided higher data speeds and new capabilities compared to previous standards. 3G was based on IMT-2000 standards and provided speeds from 144kbps to 2Mbps. The document then outlines some of the technical components and requirements of 4G networks, including that they will require new spectrum to support higher data rates and all-IP networks. Overall, it traces the progression of cellular standards and capabilities.
GSM, CDMA, and WiMax are wireless communication standards. GSM is a 2G standard used by mobile phones that operates in frequency bands between 850-1900 MHz. CDMA is a multiple access technique that allows several transmitters to send information simultaneously over a single channel. WiMax is a wireless broadband standard that provides data rates up to 1 Gbit/s for fixed stations and portable mobile broadband connectivity across cities. It provides alternatives to cable and DSL for last mile broadband access.
This document provides information about a course on wireless and mobile communications. It includes the course details such as instructor contact information, recommended textbooks, and a link to download the syllabus. It then provides a brief history of wireless communications from the 1800s to the early 1900s, including the work of scientists like Faraday, Maxwell, Hertz, and Marconi. It also discusses the evolution of mobile phone technology and cellular networks from 1G to 2G standards like GSM and CDMA.
This document provides an overview of cellular network technologies from 1G to 4G. It summarizes the evolution from analog 1G networks to digital 2G networks, then to 2.5G and 3G networks with increased data capabilities. 4G networks are described as providing further increased throughput through advanced technologies like OFDMA. Key multiple access technologies like FDMA, TDMA, CDMA used in different generations are explained. Popular cellular standards GSM and CDMA are discussed in detail along with their network architecture and capabilities. The transition from 2G to 2.5G to 3G using technologies like GPRS, EDGE is outlined. The goals and applications of 4G networks are described as fully converged services on a range
The document traces the evolution of telecommunication systems from 1G to 4G networks. It discusses the development of early communication technologies like the telegraph in the 1800s. In the late 1960s, ARPANET was developed and introduced key protocols like TCP/IP that the modern Internet relies on. Each generation of cellular networks is then summarized - 1G provided analog voice calls; 2G introduced digital networks and SMS; 3G enabled mobile Internet and new applications; and 4G aimed to support high data traffic and reduce latency with new technologies like OFDMA. The conclusion discusses challenges like improving coverage and potential future directions such as cognitive radio and mesh networks.
The document discusses the future of 4G network technology. It explains that 4G will provide ultra high broadband speeds measured in gigabytes per second, allowing users to download movies within 5 minutes or stream high-definition content to mobile devices. 4G will use technologies like OFDM and MIMO to achieve higher data transfer rates and signal quality compared to 3G. Several countries have already launched 4G networks commercially, with technologies like LTE and WiMax supporting 4G infrastructure and providing speeds up to 100 Mbps for downloads. India has begun the process of introducing 4G but may face delays similar to its 3G rollout unless it wants to catch up globally with 4G.
4G refers to the next generation of wireless technology that promises higher data rates and expanded multimedia services. It is defined as a fully IP-based integrated system providing 100 Mbps outdoors and 1 Gbps indoors, with quality of service and security, offering customized personal services anywhere through seamless interoperability using technologies like OFDM, MIMO and IPv6. Research is ongoing to build 4G networks through approaches like lower prices, more spectrum coordination, and standardization while addressing issues like security, lack of standards and wireless spam.
This document compares GSM and CDMA mobile technologies. It outlines that GSM uses TDMA and FDMA to allow multiple users to access frequencies, while CDMA uses direct sequence spread spectrum and unique codes to separate users on the same frequency. The document discusses features of each technology such as frequency reuse in GSM. It analyzes advantages of both such as better voice quality in CDMA due to use of entire spectrum, and international roaming capability in GSM. Overall, the document provides a technical overview comparing key aspects of GSM and CDMA mobile networks.
The document provides a summary of the history and evolution of internet and wireless broadband technology. It discusses the early concepts of computer networking starting in the 1960s, the development of ARPANET in the late 1960s, and the introduction of TCP/IP in the early 1970s which led to the modern internet. It then covers the emergence of dial-up internet access in the late 1970s and 1980s, and the evolution of cellular network technologies from 1G to 4G. Finally, it provides an overview of LTE and LTE-Advanced wireless broadband technologies and their capabilities.
CR technology is based on the fact that the licensed systems (also named primary systems PS) are not always using their spectrum bands; CR brings new radio types—cognitive radios—that should firstly, identify the existing spectrum holes, and secondly, utilize them according to an access
This document provides an overview of communication and network concepts. It discusses the evolution of networking from ARPANET in 1969 to the modern Internet. It describes common network components like switches, routers, and gateways. It also covers different types of networks, topologies, transmission media like twisted pair, coaxial cable, optical fiber and wireless transmission. Network protocols, security concepts, open source software, and types of malware are also summarized.
This document provides an overview of WiMAX technology. It discusses what WiMAX is, its key features such as high data rates, long range, mobility, and scalability. It covers WiMAX network structure, prior technologies like LMDS and MMDS, IEEE 802.16 standards and features including OFDM subcarriers. The document also compares WiMAX to LTE and discusses their similarities and differences. In conclusion, it states that LTE is more widely adopted as a 4G technology due to its compatibility with previous mobile standards, while WiMAX remains useful for some applications.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Mobile telephony has evolved through several generations from early 0G analog mobile radio systems to current 4G systems. The document traces this evolution from 1G analog cellular networks using FDMA in the 1980s with speeds around 10 kbps, to 2G digital cellular networks using TDMA and CDMA in the 1990s with speeds around 64-144kbps. 3G networks then provided higher speed multimedia access around 144kbps to 2Mbps in the early 2000s. 4G networks currently offer broadband speeds from 100Mbps to 1Gbps for more advanced applications.
Building rugged and reliable networks with fiber automation.comShane Duffy
This presentation discusses building rugged and reliable networks using fiber optic cables. It covers the advantages of fiber over copper, including higher bandwidth, longer transmission distances, electromagnetic immunity, and cost reductions over time. The presentation also discusses network layers, designing resilient network topologies, selecting appropriate fiber and equipment, and applications that benefit from fiber networks like security, signage, transportation, manufacturing, and data centers.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
International Conference on NLP, Artificial Intelligence, Machine Learning an...
Lte umb wi_max presentation
1. University of Kansas | School of Engineering
Similarities and Differences between LTE, UMB &
WiMax
Department of Electrical Engineering
and Computer Science
Presented By: Brandt Elster
2. University of Kansas | School of Engineering
Outline
•WiMax News
•Definitions
•Background & History
•Motivations and Objectives
•Deterrents
•Services and QoS
•Network Architecture
•Physical Layer & MAC Protocols
•Comparison of the Technologies
•Future of the Technology
Department of Electrical Engineering
and Computer Science
Brandt Elster 09/24/14 Page 2 of 58
3. University of Kansas | School of Engineering
WiMax News Today
• Today there was a large announcement regarding the future of mobile WiMax
• Since Dan Hesse became the new Sprint CEO there were doubts he would continue
Sprint’s future in their WiMax venture named XOHM.
• Immediately upon becoming CEO he terminated an existing agreement to work along side
Clearwire and collaborate on separate WiMax networks that were able to roam on each others to
increase coverage
• Today Sprint and Clearwire put out a joint press release stating they had formed a joint
venture that would be named Clearwire to build one WiMax network.
• This new company has received investments from the following companies: Google, Intel,
Comcast, Time Warner Cable, and Bright House networks
• These companies have combined together for a total investment of $3.2 billion
• They will receive an estimated 22% ownership of the company
• Sprint will maintain the largest share at 51% and Clearwire will control 27%
• The deal is estimated to be worth a total of $14.5 billion
Department of Electrical Engineering
and Computer Science
Brandt Elster 09/24/14 Page 3 of 58
4. University of Kansas | School of Engineering
Definitions - LTE
• Long Term Evolution is more commonly referred to as LTE
• LTE is the 4th generation network that was designed through the Third Generation Partnership
Project (3GPP).
• It is an all IP network
• Its primary goals were to improve efficiency, lower infrastructure costs, create a higher QoS,
all while making use of new spectrum opportunities, and better integrating with other open
standards
• Predominantly created by Ericsson, Nortel and Nokia-Siemens
• Should result in release 8 of the UMTS standard
Department of Electrical Engineering
and Computer Science
Brandt Elster 09/24/14 Page 4 of 58
5. University of Kansas | School of Engineering
Definitions - UMB
• Ultra Mobile Broadband is commonly referred to as UMB
• UMB is the 4th Generation wireless broadband access network developed through the CDMA
Development Group (CDG)
• It is an all IP network
• It was designed from the ground up to provide the type of access required in the modern
mobile world, with great flexibility and interoperability
• Standardized by the 3rd Generation Partnership Project 2 (3GPP2)
• Proprietary technology developed by Qualcomm
Department of Electrical Engineering
and Computer Science
Brandt Elster 09/24/14 Page 5 of 58
6. University of Kansas | School of Engineering
Definitions - WiMax
• Mobile WiMax is short for Wireless Interoperability for Microwave Access
• There is actually a difference between mobile WiMax and fixed WiMax
• Today we are only going to talk about the mobile version of WiMax
•WiMax is the 4th Generation wireless broadband access network developed by the IEEE
• It is the 802.16e or upcoming 802.16m standards
• It is an all IP network
• Many hardware manufacturers are already supporting WiMax due to it’s open standards.
Some of the larger ones include Samsung, Motorola and Intel.
Department of Electrical Engineering
and Computer Science
Brandt Elster 09/24/14 Page 6 of 58
7. University of Kansas | School of Engineering
Background & History
• Analogy for the differences between TDMA, FDMA, SDMA, CDMA
• Take a large room with a decent number of people in it. There are multiple different
conversations going on throughout the room.
• TDMA – Everyone in the room would take turns speaking. Each group of people would be
assigned a specific time slot.
• FDMA – Each group in the room would speak at a different pitch (frequency) far enough apart that
they can be differentiated.
• SDMA – Each group’s speaker would talk in a specific direction, only people in front of them would
be able to hear. If the room is big enough you could have multiple people speaking in the same
direction as long as they were far enough apart.
• CDMA – Each group would be assigned a specific language to communicate with. They would be
able to easily discern their specific language and all others would be small and ignorable
background noise.
Department of Electrical Engineering
and Computer Science
Brandt Elster 09/24/14 Page 7 of 58
8. University of Kansas | School of Engineering
Background & History
• OFDMA
• Basically an enhanced version of FDMA
• Allows for the elimination of guard bands by using orthogonal signals.
• Signals are considered to be orthogonal if their dot products are equal to 0
• Signals are able to overlap without causing interference to the other
• Signals are modulated and demodulated using the Fast Fourier Transform
• SC-OFDM
• This is a single carrier equivalent of OFDMA
• Each transmission is given only one carrier
• This allows the peak-to-average power to be lower thus increasing the capable average power of
the power amplifier
• This is helpful because the user terminal is generally battery powered and this includes both battery
life and range
Department of Electrical Engineering
and Computer Science
Brandt Elster 09/24/14 Page 8 of 58
9. University of Kansas | School of Engineering
Background & History - LTE
• Part of the 3GPP standard
• Essentially it is HSPA rev 8
• It was given the name Long Term Evolution by the 3GPP
• The name follows their generally naming scheme. They try to make their name represent their
monopoly over the wireless arena
• GSM stands for Global Standard for Mobile & UMTS stands for Universal Mobile Telephone
Standard
• Originally started as GSM
• Capable of virtually no data communications
• Pioneered the first short messaging service (SMS)
• Supports handoffs with all UMTS and GSM networks
• There is discussion to build in the ability to support handoffs with CDMA networks
Department of Electrical Engineering
and Computer Science
Brandt Elster 09/24/14 Page 9 of 58
10. University of Kansas | School of Engineering
Background & History - LTE
• GSM was the 2G technology that both GPRS and EDGE are based on
• GPRS was the first step
• Stands for General Packet Radio Service
• It is considered to be a 2.5G
• Capable of speeds from 56 up to 114 kbit/s
• Supports a very robust voice channel and low bandwidth data options.
• Main data use was text internet & downloading of reduced size pictures and music
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 10 of 58
11. University of Kansas | School of Engineering
Background & History - LTE
• EDGE was the next step
• Stands for Enhanced Data rates for GSM Evolution
• It is considered to be a 2.75G
• Capable of speeds from 1 Mbit/s
• Reduced latency to 100 ms
• However just like GPRS, the main data use was text internet & downloading of reduced
size pictures and music
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 11 of 58
12. University of Kansas | School of Engineering
Background & History - LTE
• Following EDGE came UMTS
• Stands for Universal Mobile Telephone Standard
• UMTS was the first truly 3G technology to come from 3GPP
• UMTS is a completely different technology than GSM.
• It required a completely new network be built over the top of any existing networks
• UMTS uses W-CDMA instead of the TMDA that powered GSM
• The primary difference between W-CDMA and CDMA2000 is that W-CDMA uses 5 MHz blocks of
spectrum and CDMA2000 uses only 1.25 MHz blocks, hence where the “wide” came from
• The first revision of UMTS was capable of speeds up to 2 MB/s
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 12 of 58
13. University of Kansas | School of Engineering
Background & History - LTE
• HSPA was the final step for W-CDMA
• HSPA stands for High Speed Packet Access
• There are three different enhancements to HSPA, HSDPA, HSUPA and HSOPA
• HSDPA stands for High Speed Downlink Packet Access
• It predominantly increases the download speed of the network.
• HSUPA stands for High Speed Uplink Packet Access
• It predominantly increases the upload speed of the network
• HSOPA stands for High Speed OFDM Packet Access
• This technology replaces the entire infrastructure of UMTS and replaces it with a new OFDM
infrastructure
• It is a separate technology from LTE but is part of the overall picture. Most likely it will never be
implemented but it’s technologies will be morphed into LTE
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 13 of 58
14. University of Kansas | School of Engineering
Background & History - LTE
• Table of different UMTS Technologies and their specifications:
Technology Release Data Downlink Speed Uplink Speed
UMTS 2000 384 kb.s 128 kb/s
HSDPA 2000 7.2 Mb/s 384 kb/s
HSUPA 2005 7.2 Mb/s 5.76 Mb/s
HSOPA 2009 100 Mb/s 50 Mb/s
LTE 2010 100 Mb/s 50 Mb/s
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 14 of 58
15. University of Kansas | School of Engineering
Background & History - UMB
• Part of the CDMA 2000 standard
• First named EV-DO rev C
• Renamed to Ultra Mobile Broadband by the CDMA Development Group (CDG)
• Originally started as cdmaOne
• A 2G Qualcomm technology
• Capable of virtually no data communications
•Will be capable of call handoffs with all legacy CDMA2000 networks
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 15 of 58
16. University of Kansas | School of Engineering
Background & History - UMB
• cdmaOne was the 2G technology that both 1xRTT, 1xEV-DO, and 1xEV-DV are based on
• 1xRTT was the first step
• It is considered to be a 2.5G
• Capable of speeds up to 144 kbit/s
• Also referred to as just 1x
• Supports a very robust voice channel and low bandwidth data options.
• Main data use was text internet & downloading of reduced size pictures and music
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 16 of 58
17. University of Kansas | School of Engineering
Background & History - UMB
• The next step was 1xEV-DO (Evolution Data Only)
• Later renamed Evolution Data Optimized to remove the negative connotation
• Most commonly referred to as just EVDO, or simply EV
• First truly 3G technology and first real wireless broadband technology.
• An alternative to EVDO was 1xEV-DV (Evolution Data & Voice)
• The standard was not completed in time so it was ultimately passed up
• Theoretical speeds of 3.1 Mbit/s downlink and 1.8 Mbit/s uplink.
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 17 of 58
18. University of Kansas | School of Engineering
Background & History - UMB
• EVDO began as Rel 0.
• Significant speed improvements over 1x
• 2.4 Mbit/s downlink
• 153 kbps uplink
• Includes the following protocols and more
• Hybrid ARQ
• Incremental Redundancy Feedback in the
Downlink
• Downlink and Uplink Rate Controls
Department of Electrical Engineering
and Computer Science
• Supports the following applications
• broadband Internet
• MP3 music downloads
• 3D gaming
• TV broadcasts
• Video and audio downloads
09/Brandt Elster 24/14 Page 18 of 58
19. University of Kansas | School of Engineering
Background & History - UMB
• The current and most up to date standard of the CDMA2000 protocol is EVDO Rev A
• It is currently being deployed over Rel 0
• Capable of producing speeds of 3.1 Mbit/s downlink and 1.8 Mbit/s uplink
• Uses enhanced access channel MAC
• Controls who sends and who receives and when
• Advanced QoS support
• Increased spectral efficiency
• 1.2 times Rel 0 forward link sector capacity and 3.4 times reverse link sector capacity
• Low latency, below 50 ms
• Supports all the services of Rel 0 but adds higher quality video and faster loading times for
streaming services
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 19 of 58
20. University of Kansas | School of Engineering
Background & History - UMB
• Rev B would be the next upgrade
• It is likely to be skipped for Rev C in 2009 similar to how EVDV was bypassed
• Speeds of up to 14.7 Mbit/s downlink
• Utilizes statistical multiplexing
• Hybrid frequency reuse
• Supports OFDM
• Adds multi carrier support
• Rev A uses 1.25 MHz carriers, most likely 3 per user would be used for Rev B, or 3.75 MHz
• This is unique from HSPA because the carriers do not need to be adjacent
• This allows operators to combine spectrum from multiple blocks
• Adds the ability to do High Definition video streaming, multiplayer online gaming, and
replacement of home HSI and hotspots
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 20 of 58
21. University of Kansas | School of Engineering
Background & History - WiMax
• It evolved from the WiFi standards in an effort to create a technology that could cover a larger
footprint.
• Example, if WiMax is a cell phone, then WiFi would be a cordless phone.
• Fixed WiMax was designed as a technology that could be used to blanket a city with mobile
internet to replace building costly short range WiFi networks.
• Mobile WiMax took the same technology and evolved it into version that could work with
devices that are no longer stationary
•WiMax comes from the IEEE 802 set of standards.
• The IEE 802 standards are a family of standards that deal with Local Area Networks
(LANs) and Metropolitan Area Networks (MANs)
•WiMax is the 802.16 standard.
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 21 of 58
22. University of Kansas | School of Engineering
Background & History - WiMax
• History of the IEEE 802 standard
• IEEE 802.3 is collection of IEEE standards that define the Media Access Control Layer,
Physical Layer and Data Link Layer of the wired Ethernet standard
• IEEE 802.11 is Wireless LAN & Mesh a.k.a. WiFi
• It is a group of standards for wireless local area networks (WLAN)
• These typically operate in unlicensed spectrum bands located near 2.4 GHz and 5 GHz.
• Maximum range of WiFi is roughly 70m indoors using the 802.11n standard and is capable of
producing 74 Mbit/s
• IEEE 802.15 is Wireless Person Area Networks (PAN)
• This standard includes Bluetooth and ZigBee
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 22 of 58
23. University of Kansas | School of Engineering
Background & History - WiMax
• Brief Discussion of 802.11 Wifi
•Wifi is predominantly used in the 2.4 GHz range due to range limitations with the 5GHz
frequency band
• It divides these frequency bands into channels that are 22 MHz wide with 5 MHz spacing in
between.
• WiFi networks consist of two main components. The Access Points (APs) and the clients. The AP
continuously broadcasts it’s SSID or name every 100 ms at 1 Mb/s. Sending at 1 Mb/s ensures
that all users are at least capable of sending at that speed.
• WiFi is not capable of collision detection. It instead does collision avoidance using RTS/CTS. It
also uses acknowledgements to make sure that the packet is received.
• Generally WiFi networks connect back to a 802.3 Ethernet connection, but they can connect 2
devices to one another (AdHoc Networks) or connect a computer directly to the internet.
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 23 of 58
24. University of Kansas | School of Engineering
Background & History - WiMax
• Brief Discussion of 802.11 Wifi
Protocol Release
Date
Department of Electrical Engineering
and Computer Science
Freq Typical
Thruput
Max Data
Rate
Indoor
Range
Outdoor
Range
Legacy
802.11
1997 2.4 GHz .9 Mb/s 2 Mb/s 20 m 100 m
802.11a 1999 5 GHz 23 Mb/s 54 Mb/s 35 m 120 m
802.11b 1999 2.4 GHz 4.3 Mb/s 11 Mb/s 38 m 140 m
802.11g 2003 2.4 GHz 19 Mb/s 54 Mb/s 38 m 140 m
802.11n June 2009 2.4 GHz
5 GHZ
74 Mb/s 248 Mb/s 70 m 250 m
802.11y June 2009 3.7 GHz 23 Mb/s 54 Mb/s 50 m 5 km
09/Brandt Elster 24/14 Page 24 of 58
25. University of Kansas | School of Engineering
Motivations - LTE
• Chosen European standard likely to be used throughout the world
• Large companies have committed to it
• Vodaphone (part owner Verizon Wireless)
• AT&T
• High speed data throughputs
• 100 Mbps Downlink
• 50 Mbps Uplink
• Cost effective compared to UMTS based technologies
• Backwards compatible with all UMTS/GSM technologies
• High QoS for a wide range of applications
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 25 of 58
26. University of Kansas | School of Engineering
Motivations - LTE
• Can be deployed within existing GSM & UMTS frequency bands along side existing networks
• Can use only a portion of the frequency band in the beginning and then can take more
existing spectrum as old networks are phased out.
• Designed for high mobility
• Optimized for 0 – 15 km/h
• High performance still achievable for less than 150 km/h
•Will still support anything up to 500 km/h
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 26 of 58
27. University of Kansas | School of Engineering
Motivations - UMB
•Motivations for EVDO Rev C (UMB)
• Backwards compatible with all CDMA 2000 Networks
• High speed data throughputs
• 280 Mbps Downlink
• 75 Mbps Uplink
• Low latency connections
• An average of 16 ms (32-byte, RTT) end-to-end network latency
• High QoS for a wide range of applications
• Seamless mobility
• Efficient frequency re-use deployment
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 27 of 58
28. University of Kansas | School of Engineering
Motivations - WiMax
• Time to market:
• Has already seen a small launch in the United States – Clearwire
• Has seen similar deployments around the world.
• Large companies have committed to it
• Sprint-Nextel (XOHM)
• SK Telecom (WiBro is a variant of WiMax and has been launched in South Korea)
• There have been discussions to morph WiMax into the LTE Umbrella and make it a stepping
stone to LTE
• This may be a play simply to discredit WiMax and make it sound inferior
• The newest revision of Mobile WiMax (802.16m) is expected from the IEEE sometime this
year and should bring the theoretical speeds for a mobile application up to a level of those
expected from LTE & UMB.
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 28 of 58
29. University of Kansas | School of Engineering
Deterrents
•Long Term Evolution (LTE)
• Time to market:
• Not expected to have a widespread deployment until 2012
• Components not available until late 2009
• 4 years behind Mobile WiMax
•Ultra Mobile Broadband (UMB)
• Time to market: Components first available in late 2009 to 2010.
• No corporate commitments throughout world
• Even the majority of current CDMA carriers have chosen other platforms
•Mobile WiMax
• Speeds are not up to the level of UMB & LTE
• Downlink capable of 46 Mb/s (without MIMO)
• Less than half that of UMB & LTE
• *note that 802.16m is expected to raise these figures to 100 Mb/s and should be out sometime this year and available around
2010. Note this is still 2 years before LTE is expected to widely deployed.
• Not officially classified as 4G by European standards due in part to insufficient speeds
• Unproven, a lot is riding on the success of Sprint’s consumer launch (XOHM)
• Success could lead to more build outs worldwide turning it into a global standard
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 29 of 58
30. University of Kansas | School of Engineering
Deterrents
•All three technologies face another crucial issue. Backhaul
• As speed increase the need for more and more leased lines increases. Fiber alleviates some
pressure but is limited in roll outs and is relatively expensive.
• Alternative options include but are not limited to
• Microwave
• Fixed WiFi or WiMax
• Dark Fiber
• ADSL or SHDSL
• PDH or SDH/SONET infrastructures
• E1/T1, E3, T3, STM-1/OC-3 …
• Cable Coaxial lines
• None of these options is widely available in the U.S., Especially in the mass rural parts of the
county.
• Sprint is supposedly using Microwave to provide the backhaul to their WiMax towers where
fiber is not yet available.
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 30 of 58
31. University of Kansas | School of Engineering
Spectrum Allocations
•Long Term Evolution (LTE)
• 1.25 MHz to 20 MHz chunks
• Can operate in all 3GPP frequency bands in paired and unpaired spectrum allocations
• Can sit in the same band as existing 3GPP networks. Allows for LTE to be phased in while
older technologies are phased out.
•Ultra Mobile Broadband (UMB)
• 1.25 MHz up to 20 MHz
•Mobile WiMax
• Any frequency below 66 GHz
• Fixed channel sizes of 3.5 MHz, 5 MHz, 7 MHz, 10 MHz, and 20 MHz.
• Mobile channel sizes of 5 MHz, 8.75 MHz and 10 MHz.
• This does not phase Sprint or Clearwire as both have almost 120 MHz of spectrum in their areas,
but smaller companies could face issues when only operating in 10 or 20 MHz blocks.
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 31 of 58
32. University of Kansas | School of Engineering
Services and QoS
• Streaming of high quality video and audio
• Video calling
• VOIP for phone calls
• Provide enhanced data speeds for both handheld devices and laptop connect cards
• Could replace the traditional wired networks as they are much cheaper than fiber to the curb,
and speeds look to be the same if not higher than those offered via wired today
• This would be for the following services
• HSI to replace DSL/Cable Modems
• Digital Phone for the Home
• IPTV or TV over IP to replace standard cable or satellite provider
• This would give previously only mobile operators the ability to sell the very lucrative triple
play that, up until now, only existing LEC and cable operators have been able to.
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 32 of 58
33. University of Kansas | School of Engineering
Services and QoS
Category Current Environment 4G Possibilities
Department of Electrical Engineering
and Computer Science
[Source: UMTS Forum,
"Standardising the future
of mobile
communications with
LTE (Long Term
Evolution)." Towards
Global Mobile
Broadband (2008): ]
09/Brandt Elster 24/14 Page 33 of 58
34. University of Kansas | School of Engineering
Services and QoS
• Companies are also looking to build 4G chips into more electronic devices than just cell
phones and laptops
• Looking for every electronic device to have a 4G connection to the internet
• Fridge could download recipes and auto update shopping list with what you need
• Digital camera’s would be able to instantly upload photo’s to photo sharing and social
networking sites, as well as having the ability to send them via email directly from the
camera
• MP3 players could download songs from anywhere, similar to the Apple iPod Touch but
without the need for a WiFi connection
• Cars would be able to auto diagnose issues and email the mechanic to notify them of
issues
• These are just a couple of the endless possibilities that 4th generation networks are trying
to tap into
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 34 of 58
35. University of Kansas | School of Engineering
Network Architecture
Department of Electrical Engineering
and Computer Science
[Source: Dahlman, Erik. 3G
Evolution HSPA and LTE
for Mobile Broadband.
First. London: ELSEVIER,
2007.]
09/Brandt Elster 24/14 Page 35 of 58
36. University of Kansas | School of Engineering
Network Architecture - LTE
• LTE combines the following network protocols into a single air interface, utilizing the
individual advantages of each one
• OFDMA
• MIMO (2x2 or 2x4)
• ARQ within the RLC sub layer and HARQ within the MAC sub layer
• FDD & TDD
• SC-FDMA
• Up to 64 QAM DL and 16 QAM UL
• Turbo Coding (rate – 1/3, 2 8 state constituent encoders and a contention-free internal
interleaver)
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 36 of 58
37. University of Kansas | School of Engineering
Network Architecture - LTE
•The core network architecture of LTE has been given it’s own name. It is called System
Architecture Evolution (SAE)
•SAE is relatively similar to the GPRS Core Network that includes some basic modifications.
•Most notably a simplified architecture
•Spectrum allocations from 1.25 MHz up to 20 MHz
•Can support 200 simultaneous VOIP users across a cell consisting of 5 MHz
•Provides interference reduction through power control and link adaptation techniques
•A common node B. Acts as a common gateway for all of the access technologies that
access the network
•Can support handoffs between both 3GPP networks and non-3GPP networks
•This should allow legacy CDMA2000 operators to interface their old networks with LTE
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 37 of 58
38. University of Kansas | School of Engineering
Network Architecture - LTE
Department of Electrical Engineering
and Computer Science
[Source: Myung, Hyung G.. "Technical Overview of 3GPP Long Term Evolution (LTE)."2007.]
09/Brandt Elster 24/14 Page 38 of 58
39. University of Kansas | School of Engineering
Network Architecture - UMB
• UMB is a proprietary technology to Qualcomm Inc.
• There is only a limited amount of information available regarding the actual architecture and
physical properties of the technology.
• This a summary of the available information available from Qualcomm white papers.
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 39 of 58
40. University of Kansas | School of Engineering
Network Architecture - UMB
• According to the CDG UMB combines the following network protocols into a single air
interface, utilizing the individual advantages of each one
• CDMA
• OFDMA
• MIMO
• SDMA
• FDD
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 40 of 58
41. University of Kansas | School of Engineering
Network Architecture - UMB
•Spectrum allocations from 1.25 MHz up to 20 MHz
• Can support 1000 simultaneous VOIP users across 20 MHz FDD
•A flat network architecture
• Simplifies core network design
• Eliminates the need for centralized base station controllers (BSCs)
•A converged-access network (CAN) design that enables seamless mobility
•A multi-route feature that enables fast switching between base stations and provides requisite
support for latency-sensitive applications
•Layer 2 and layer 3 tunneling mechanisms to simplify the network interface
•Adaptive interference management
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 41 of 58
42. University of Kansas | School of Engineering
Network Architecture - UMB
Department of Electrical Engineering
and Computer Science
[Source: "UMB Network
Architecture." Qualcomm
Inc Dec 2007 02 Apr
2008 <7.
http://www.qualcomm.co
m/common/documents/w
hite_papers/UMB_Netwo
rk_Achitecture.pdf>. ]
09/Brandt Elster 24/14 Page 42 of 58
43. University of Kansas | School of Engineering
Network Architecture - WiMax
• Mobile WiMax combines the following network protocols into a single air interface, utilizing
the individual advantages of each one
• TDM access with variable frame sizes (2 - 20 ms)
• OFDM
• MIMO
• Adaptive Antenna System (AAS)
• QPSK, 16 QAM, 64 QAM
• Convolutional Codes, Convolutional Turbo Codes, Block Turbo Codes, and Low-Density
Parity Check (LDPC) Codes
• Hybrid ARQ
• TDD, FDD & H-FDD
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 43 of 58
44. University of Kansas | School of Engineering
Network Architecture - WiMax
•The following channel bandwidths are supported:
• 5 MHz, 7 MHz, 8.75 MHz, 10 MHz and 20 MHz
•These spectrum allocations can be anywhere within the following licensed spectrum bands
• 2.3 GHz, 2.5 GHz, 3.3GHz, 3.5GHz
•While WiMax can support both TDD and FDD, it is only truly supporting TDD at this point. The
ability to do FDD should be built into a later revision.
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 44 of 58
45. University of Kansas | School of Engineering
Network Architecture - WiMax
"Network Architecture." HiperMAX-micro. Airspan. 7 May 2008 <http://www.airspan.com/products_wimax_microcell_hipermax.aspx>.
Department of Electrical Engineering
and Computer Science
Brandt Elster 09/24/14 Page 45
46. University of Kansas | School of Engineering
Physical Layer & MAC Protocols - LTE
•The physical layer was defined with the bandwidth constraints of LTE in mind.
• This is important in allowing it to easily adapt to various spectrum allocations
• It is also important to get as much data throughput as possible through the connection
•LTE uses up to 64 QAM for the downlink and up to 16 QAM for the uplink. In contrast, its
broadcast only channel uses on BPSK.
•LTE also uses turbo coding for all transport blocks
• It uses a rate 1/3 code
• It also has 2 8-state constituent encoders as well as a contention-free QPP internal
interleaver
• The turbo coding scheme uses a trellis termination technique.
• Before the turbo coding, transport blocks are segmented into byte aligned segments with a
maximum information block size of 6144 bits.
• Error detection is supported by the use of 24 bit CRC.
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 46 of 58
47. University of Kansas | School of Engineering
Physical Layer & MAC Protocols - LTE
•Both the downlink and the uplink share the same frame structure.
•Both can use either a FDD or TDD mode of operation.
•LTE frames are defined as 10 ms
•The frames are divided into 10 subframes
•Each subframe is further divided into two slots
•Each .5 ms slot can consist of either 6 or 7 ODFM symbols
•This structure is shown below
Department of Electrical Engineering
and Computer Science
[Source: Myung, Hyung G.. "Technical Overview of 3GPP Long Term Evolution (LTE)."2007.]
09/Brandt Elster 24/14 Page 47 of 58
48. University of Kansas | School of Engineering
Physical Layer & MAC Protocols - LTE
•LTE has three access procedures
• Cell Search
• Cell search is the protocol for when the mobile handset (terminal) finds a cell tower (cell)
that it potentially would like to communicate with
• The mobile handset needs to identify the cell tower and needs to estimate the frame timing
of that cell tower.
• There are three main steps in performing a cell search
1. To assist in these steps the cell tower broadcasts a primary and secondary synch bit in the downlink
2. The mobile handset uses the primary synch bit to find the primary timing of the tower during a 5 ms
slot
3. The mobile handset needs to detect the cell-identity information and determine the frame timing.
This can be done by checking the pairs of slots where the secondary synch but should be
transmitted
4. The cell tower now broadcasts the system information so that the mobile handset can determine the
remaining parameters.
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 48 of 58
49. University of Kansas | School of Engineering
Physical Layer & MAC Protocols - LTE
•LTE has three access procedures
• Random Access
• This is when the terminal requests a
connection setup
• There are 4 steps to the random access
procedure
1.The terminal first sends a random-access preamble.
This allows the eNodeB to estimate the transmission
timing of the terminal
2.The network then sends a timing advance command
if the terminals transmission timing is off. This also
assigns uplink resources to the terminal
3.The mobile-terminal then sends it’s identity to the
network. This is sent using the UL-Scheduling
protocols specific to the network.
Department of Electrical Engineering
and Computer Science
4. The network then sends a contention-resolution
message to the terminal. This
resolves and conflicts of multiple terminals
attempting to access the same resources.
[Source: Dahlman, Erik. 3G Evolution HSPA and LTE for Mobile
Broadband. First. London: ELSEVIER, 2007.]
09/Brandt Elster 24/14 Page 49 of 58
50. University of Kansas | School of Engineering
Physical Layer & MAC Protocols - LTE
•LTE has three access procedures
• Paging
•When the mobile device is not in use it is allowed to go to sleep
• Paging sets the protocols for a network-initiated connection setup
• When the mobile device goes to sleep it automatically wakes up at pre-defined intervals
• These pre-defined intervals are set up to coincide exactly with the L1/L2 control signaling to
prevent the need for a dedicated channel like what is used in UMTS
Department of Electrical Engineering
and Computer Science
[Source: Dahlman, Erik. 3G
Evolution HSPA and LTE
for Mobile Broadband.
First. London: ELSEVIER,
2007.]
09/Brandt Elster 24/14 Page 50 of 58
51. University of Kansas | School of Engineering
Physical Layer & MAC Protocols - WiMax
•WiMax uses QPSK, 16 QAM and 64 QAM in the downlink and QPSK and 16 QAM in the uplink
•WiMax also uses the following coding schemes:
• Tail-Biting Convolutional Code
• Convolutional Turbo Code
• Block Turbo Code (optional)
• Low-Densitiy Parity Check Code (LDPC) (optional)
• Zero Tailed Convolutional Code (optional)
•WiMax also uses a scheduling algorithm
• Each mobile handset competes for a slot only once (for initial entry into the network).
• Once it has won an access slot from the base station it cannot lose it unless it disconnects
from the tower.
• The tower can enlarge and contract the individual time slots, but no matter what, it remains
assigned to the specific subscriber station
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 51 of 58
52. University of Kansas | School of Engineering
Physical Layer & MAC Protocols - WiMax
•The mobility versions of WiMax have three basic handover methods defined. They are:
• Hard Handover (HHO):
• The mobile handset scans the nearby base stations and gathers a list of all the possible
base stations.
• It uses this information to determine if a handoff is necessary. Both the base station and
mobile handset can decide to start the handoff
• Once this decision is made the handset immediately starts communicating with the new
base station
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 52 of 58
53. University of Kansas | School of Engineering
Physical Layer & MAC Protocols - WiMax
•The mobility versions of WiMax have three basic handover methods defined. They are:
• Fast Base-Station Switching (FBSS):
• The mobile handset maintains a set of multiple suitable base stations
• One base station is selected as the anchor and is where all the communications will take
place.
• The mobile handset will continuously choose which ever base station has the best
connection from its list.
• The mobile handset can change the anchor at any time without any handover signaling
• Macro-Diversity Handover (MDHO):
• Just like in FBSS the mobile handset keeps an anchor and a list of base stations
• However this time the mobile handset communicates with all base stations
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 53 of 58
54. University of Kansas | School of Engineering
Comparison of the Technologies
Aspect LTE UMB WiMax
Access
OFDMA OFMDA, SDMA,
Technology (DL)
Department of Electrical Engineering
and Computer Science
CDMA*
OFDMA
09/Brandt Elster 24/14 Page 54 of 58
Access
Technology (UL)
OFDMA OFDMS, SDMA,
CDMA*
OFDMA
Capable Speeds 100 Mb/s DL
50 Mb/s UL
280 Mb/s DL
75 Mb/s
75 Mb/s
25 Mb/s
Channel BW 1.25 to 20 MHz 1.25 to 20 MHz 5, to 20 MHz
Spectral Efficiency 5 bits/sec/Hz 4-6 bits/sec/Hz 3.25 bits/sec/Hz
Time to market 2010 2009 2008
Legacy GSM/UMTS CDMA2000 WiFi
*UMB simply states the use of the technologies. There is no
mention on specifics for DL or U
**Includes latest release of 802.16M not currently available
[Source: Scheim, Jacob. "A comparison of two fourth generation technologies:
WiMax and 3GPP-LTE."Comsys. 2006.]
55. University of Kansas | School of Engineering
Future of the Technology
•Long Term Evolution (LTE)
• Should see deployments throughout Europe, US and Asia
• Vodaphone, China Mobile, Verizon Wireless, AT&T, T-Mobile (Europe & Australia), Orange,
NTT DoCoMo
• Estimates put 450 Million worldwide subscriber base by 2015
•Ultra Mobile Broadband (UMB)
• Looks to be a dead technology on arrival
• Qualcomm is now supporting LTE
•Mobile WiMax
• Currently deployed in US under brand XOHM
• On line in Chicago, Baltimore, Washington DC
• Consumer launch 2H 2008
• Deployed commercially in South Korea
• SK Telecom under the name WiBro
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 55 of 58
56. University of Kansas | School of Engineering
References
• Dahlman, Erik. 3G Evolution HSPA and LTE for Mobile Broadband. First. London:
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 56 of 58
ELSEVIER, 2007.
• TIA, "cdma2000® High Rate Packet Data Air Interface Specification." TIA-856-A Apr 2004
Apr 2 2004 <http://www.tiaonline.org/standards/technology/cdma2000/documents/TIA-856-
A.pdf>.
• Gozalvez, J. "1. Ultra Mobile Broadband [Mobile Radio]." Vehicular Technology Magazine,
IEEE Mar 2007:
• "3G - Ultra Mobile Broadband." CDG : Technology. 2008. CDG. 2 Apr 2008
<http://www.cdg.org/technology/3g_umb.asp>.
• ABI Research, " A Poor Market Outlook for Ultra Mobile Broadband (UMB) Says ABI
Research, but Qualcomm’s Future Still Secure." Business Wire 28 Dec 2007:
• "UMB Network Architecture." Qualcomm Inc Dec 2007 02 Apr 2008 <7.
http://www.qualcomm.com/common/documents/white_papers/UMB_Network_Achitecture.pd
f>.
• " ULTRA MOBILE BROADBAND (UMB) SPECIFICATION IS PUBLISHED." CDG : Mews &
Events. CDG. 2 Apr 2008 <http://www.cdg.org/news/press/2007/Sep24_07.asp>.
• "CDMA Buzz-Words EV-DO Rev C as UMB." PhoneNews.com 05 Dec 2006 02 Apr 2008
<http://www.phonenews.com/cdma-buzz-words-ev-do-rev-c-as-umb-1615/>.
57. University of Kansas | School of Engineering
References
• "What Is cdma2000?." cdma2000 Technology Family: 1xRTT, EVDO, UMB, and EVDV 02
Apr 2008 <http://eogogics.com/talkgogics/tutorials/cdma2000>.
• UMTS Forum, "Standardising the future of mobile communications with LTE (Long Term
Evolution)." Towards Global Mobile Broadband (2008):
• Wikipedia. 2 Apr 2008 <http://wikipedia.org/>.
• Scheim, Jacob. "A comparison of two fourth generation technologies: WiMax and 3GPP-LTE."
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 57 of 58
Comsys. 2006.
• Litwin, Louis. "The principles of OFDM."RF Signal Processing. 2001.
• Myung, Hyung G.. "Technical Overview of 3GPP Long Term Evolution (LTE)."2007.
• Li, Bo. "A Survey on Mobile WiMAX."Wireless Broadband Access. 2007.
• Scrase, Adriane. "Overview of the Current Status of 3GPP LTE."ETSI. 2008.
• Collins, Gerry. "The Business Case for LTE."Nortel. 2007.
• Laine, Michael Steve Stanley . "3GPP LTE (Long Term Evolution)."University of Kansas.
2008.
58. University of Kansas | School of Engineering
Questions?
Department of Electrical Engineering
and Computer Science
09/Brandt Elster 24/14 Page 58 of 58
Editor's Notes
This announcement is big news for the mobile WiMax industry as it confirms Sprint’s continued support for Mobile WiMax within the US.
This is also big news for the cable operators as from this point forward they will for the first time be able to offer a true triple play to compete with existing telephone operators. They originally tried a MVNO type platform with Sprint called Pivot, they announced several months ago to terminate the agreement due to billing platform and customer confusion issues. This JV should allow them to require a built in billing platform that would interface with their existing cable billing platforms. This would allow them to actually sell the service as a fully integrated triple play instead of simply offering the discount and limited extra services that Pivot was able to produce.
This also marks a huge step for Google. They were recently out bid by Verizon Wireless in the latest FCC spectrum auction. This would give them the ability to enter the wireless market. They recently created a new smartphone platform called Android and have been reportedly been working on an answer to the iPhone nicknamed the gPhone. This would give them the flexibility to implement more of what they want without the carrier control that has existed for so long in the US’s wireless market. The spectrum that Verizon won actually came with some open access provisions that Google was pivotal in getting implemented. They want to be able to create devices and services for devices without the carriers limiting either functionality or availability.
It is also interesting that Sprint had put forth estimates that it would cost $5 billion to build a complete nation wide wireless network.