1 / 44

Cordless Systems and Wireless Local Loop

Cordless Systems and Wireless Local Loop. Chapter 11. Cordless System Operating Environments. Residential – a single base station can provide in-house voice and data support Office A single base station can support a small office

kingram
Download Presentation

Cordless Systems and Wireless Local Loop

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cordless Systems and Wireless Local Loop Chapter 11

  2. Cordless System Operating Environments • Residential – a single base station can provide in-house voice and data support • Office • A single base station can support a small office • Multiple base stations in a cellular configuration can support a larger office • Telepoint – a base station set up in a public place, such as an airport

  3. Design Considerations for Cordless Standards • Modest range of handset from base station, so low-power designs are used • Inexpensive handset and base station, dictating simple technical approaches • Frequency flexibility is limited, so the system needs to be able to seek a low-interference channel whenever used

  4. Design Considerations for Cordless Standards • Although a number of different standards have been proposed for cordless systems • the most prominent is DECT (digital enhanced cordless telecommunications) • These systems use an approach referred to as time division duplex (TDD). We begin with a general discussion ofTDD and then turn to the details of DECT.

  5. Time Division Duplex (TDD) • TDD also known as time-compression multiplexing (TCM) • Data transmitted in one direction at a time, with transmission between the two directions • Simple TDD • TDMA TDD

  6. Simple TDD • The transmitter's bit stream is divided into equal segments. • compressed in time to a higher transmission rate, and transmitted in bursts, which are expanded at the other end to the original rate. • A short quiescent period is used between bursts going in opposite directions to allow the channel to settle down. • Thus, the actual data rate on the channel must be greater than twice the data rate required by the two end systems.

  7. Simple TDD

  8. Simple TDD • Bit stream is divided into equal segments, compressed in time to a higher transmission rate, and transmitted in bursts • Effective bits transmitted per second: R = B/2(Tp+Tb+Tg) • R = effective data rate • B = size of block in bits • Tp = propagation delay • Tb = burst transmission time • Tg = guard time

  9. Simple TDD • Actual data rate, A: A = B /Tb • Combined with previous equation: • The actual data rate is more than double the effective data rate seen by the two sides

  10. TDMA TDD • Wireless TDD typically used with TDMA • A number of users receive forward channel signals in turn and then transmit reverse channel signals in turn, all on same carrier frequency • Advantages of TDMA/TDD: • Improved ability to cope with fast fading • Improved capacity allocation

  11. DECT Frame Format • Preamble (16 bits) – alert receiver • Sync (16 bits) – enable receiver to synchronize on beginning of time slot • A field (64 bits) – used for network control • B field (320 bits) – contains user data • X field (4 bits) – parity check bits • Guard (60 bits) – guard time, Tg

  12. A Field Logical Control Channels • Q channel – used to broadcast general system information from base station to all terminals • P channel – provides paging from the base station to terminals • M channel – used by terminal to exchange medium access control messages with base station • N channel – provides handshaking protocol • C channel – provides call management for active connections

  13. B Field • B field transmits data in two modes • Unprotected mode - used to transmit digitized voice • Protected mode - transmits nonvoice data traffic

  14. DECT Protocol Architecture

  15. DECT Protocol Architecture • Physical layer – data transmitted in TDMA-TDD frames over one of 10 RF carriers • Medium access control (MAC) layer – selects/ establishes/releases connections on physical channels; supports three services: • Broadcast • Connection oriented • Connectionless • Data link control layer – provides for the reliable transmission of messages using traditional data link control procedures

  16. DECT Protocol Architecture Above the data link control layer are a set of services: • Call control: Manages circuit-switched calls, including connection setup and release. • Supplementary services: Services independent of any call that support operations. • Connectionless message service: Support of connectionless messages. This service will segment longer messages into smaller blocks for transmission and reassemble at reception, if necessary. • Connection-oriented message service: Support of connection-oriented messages.

  17. DECT Protocol Architecture Mobility management: Handles functions necessary for the secure provision of DECT services. Mobility management is organized into seven groups of services: - Identity procedures: Used for the mobile unit to identify itself to the base station - Authentication procedure: Establishes that the mobile unit is a valid network user - Location procedure: Used in systems with multiple base stations to track the location of a mobile unit - Access rights procedure: Establishes that the mobile unit has the right to gain access to a specific type of local or global network - Key allocation procedure: Distributes encryption keys for protecting network control information and user information - Parameter retrieval procedure: Used to exchange information about the parameters of the mobile unit and network operation - Ciphering-related procedure: Encryption and decryption operations

  18. Wireless Local Loop • Wired technologies responding to need for reliable, high-speed access by residential, business, and government subscribers • ISDN, xDSL, cable modems • Increasing interest shown in competing wireless technologies for subscriber access • Wireless local loop (WLL) • Narrowband – offers a replacement for existing telephony services • Broadband – provides high-speed two-way voice and data service

  19. WLL Configuration

  20. Advantages of WLL over Wired Approach • Cost – wireless systems are less expensive due to cost of cable installation that’s avoided • Installation time – WLL systems can be installed in a small fraction of the time required for a new wired system • Selective installation – radio units installed for subscribers who want service at a given time • With a wired system, cable is laid out in anticipation of serving every subscriber in a given area

  21. Wireless Local Loop WLL needs to be evaluated with respect to two alternatives: • Wired scheme using existing installed cable • Mobile cellular technology

  22. Propagation Considerations for WLL • Most high-speed WLL schemes use millimeter wave frequencies (10 GHz to about 300 GHz) • There are wide unused frequency bands available above 25 GHz • At these high frequencies, wide channel bandwidths can be used, providing high data rates • Small size transceivers and adaptive antenna arrays can be used

  23. Propagation Considerations for WLL • Millimeter wave systems have some undesirable propagation characteristics • Free space loss increases with the square of the frequency; losses are much higher in millimeter wave range • Above 10 GHz, attenuation effects due to rainfall and atmospheric or gaseous absorption are large • Multipath losses can be quite high

  24. Multipoint Distribution Service (MDS) • Multichannel multipoint distribution service (MMDS) • Also referred to as wireless cable • Used mainly by residential subscribers and small businesses • Local multipoint distribution service (LMDS) • Appeals to larger companies with greater bandwidth demands

  25. Advantages of MMDS • MMDS signals have larger wavelengths and can travel farther without losing significant power • Equipment at lower frequencies is less expensive • MMDS signals don't get blocked as easily by objects and are less susceptible to rain absorption

  26. Advantages of LMDS • Relatively high data rates • Capable of providing video, telephony, and data • Relatively low cost in comparison with cable alternatives

  27. 802.16 Standards Development • Use wireless links with microwave or millimeter wave radios • Use licensed spectrum • Are metropolitan in scale • Provide public network service to fee-paying customers • Use point-to-multipoint architecture with stationary rooftop or tower-mounted antennas

  28. 802.16 Standards Development • Provide efficient transport of heterogeneous traffic supporting quality of service (QoS) • Use wireless links with microwave or millimeter wave radios • Are capable of broadband transmissions (>2 Mbps)

  29. IEEE 802.16 Protocol Architecture

  30. Protocol Architecture • Physical and transmission layer functions: • Encoding/decoding of signals • Preamble generation/removal • Bit transmission/reception • Medium access control layer functions: • On transmission, assemble data into a frame with address and error detection fields • On reception, disassemble frame, and perform address recognition and error detection • Govern access to the wireless transmission medium

  31. Protocol Architecture • Convergence layer functions: • Encapsulate PDU framing of upper layers into native 802.16 MAC/PHY frames • Map upper layer’s addresses into 802.16 addresses • Translate upper layer QoS parameters into native 802.16 MAC format • Adapt time dependencies of upper layer traffic into equivalent MAC service

  32. IEEE 802.16.1 Services • Digital audio/video multicast • Digital telephony • ATM • Internet protocol • Bridged LAN • Back-haul • Frame relay

  33. IEEE 802.16.3 Services • Voice transport • Data transport • Bridged LAN

  34. IEEE 802.16.1 Frame Format

  35. IEEE 802.16.1 Frame Format • Header - protocol control information • Downlink header – used by the base station • Uplink header – used by the subscriber to convey bandwidth management needs to base station • Bandwidth request header – used by subscriber to request additional bandwidth • Payload – either higher-level data or a MAC control message • CRC – error-detecting code

  36. Downlink header fields • Encryption control (1 bit): Indicates whether the payload is encrypted. • Encryption key sequence (4 bits): An index into a vector of encryption key information, to be used if the payload is encrypted. • Length (11 bits): Length in bytes of the entire MAC frame. • Connection identifier (16 bits): A unidirectional, MAC-layer address that identifies a connection to equivalent peers in the subscriber and base station MAC. • Header type (1 bit): Indicates whether this is a generic or bandwidth request header.

  37. Downlink header fields • ARQ indicator (1 bit): Indicates whether the frame belongs to an ARQ enabled connection. • Fragment control (2 bits): Used in fragmentation and reassembly, as explained subsequently. • Fragment sequence number (4 bits): Sequence number of the current fragment. • Header check sequence (8 bits): An 8-bit CRC used to detect errors in the header.

  38. MAC Management Messages • Used by the base station and the subscriber to manage the air interface and manage the exchange of data over the various connections. • Messages are used to exchange operating parameters and status and encryption-related information and for capacity management.

  39. MAC Management Messages • Uplink and downlink channel descriptor: Transmits characteristics of the physical channel. • Uplink and downlink access definition: Allocates access to the uplink and downlink channels. • Ranging request and response: The request is used by the subscriber to determine network delay and to request power and/or modulation adjustment. The response from the BS contains the requested parameters. • Registration request, response and acknowledge: The request is transmitted by the subscriber at initialization time and contains various relevant parameters. The base station replies with a response, and the subscriber sends an acknowledge to complete the handshake.

  40. MAC Management Messages • Privacy key management request and response: Used to exchange information about encryption keys. • Dynamic service addition request, response and acknowledge: The request is sent by a subscriber to request a new service flow. • Dynamic service change request, response, and acknowledge: The request is sent by a subscriber or the base station to dynamically change the parameters of an existing service flow. • Dynamic service deletion request and response: The request is sent by the base station or subscriber to delete an existing service flow.

  41. MAC Management Messages • Multicast polling assignment request and response: Sent by a subscriber to request inclusion in a multicast polling group. • Downlink data grant type request: Sent by the base station to the subscriber to dictate the modulation method and FEe technique to be used on a particular connection, to enhance performance. • ARQ acknowledgment: Used to acknowledge successful receipt of one or more packets from the peer MAC entity.

  42. Physical Layer – Upstream Transmission • Uses a DAMA-TDMA technique • Error correction uses Reed-Solomon code • Modulation scheme based on QPSK

  43. Physical Layer – Downstream Transmission • Continuous downstream mode • For continuous transmission stream (audio, video) • Simple TDM scheme is used for channel access • Duplexing technique is frequency division duplex (FDD) • Burst downstream mode • Targets burst transmission stream (IP-based traffic) • DAMA-TDMA scheme is used for channel access • Duplexing techniques are FDD with adaptive modulation, frequency shift division duplexing (FSDD), time division duplexing (TDD)

  44. Burst downstream mode • FDD with adaptive modulation: This is the same FDD scheme used in the upstream mode, but with a dynamic capability to change the modulation and forward error correction schemes. • Frequency shift division duplexing (FSDD): This is similar to FDD, but some or all of the subscribers are not capable of transmitting and receiving simultaneously. • Time division duplexing (TDD): This technique is discussed in Section 11.1. A TDMA frame is used, with part of the time allocated for upstream transmission and part for downstream transmission.

More Related