Escolar Documentos
Profissional Documentos
Cultura Documentos
Prof.G.Markarian
Architecture
The following figure shows a simple mobile
system architecture.
This system shows a mobile system with
three Base Transceiver Stations (BTS), one
Base Station Controller (BSC), and one
Mobile Switching Center (MSC).
This figure also shows three mobile stations
(MSs ).
Department of Communication Systems
Lancaster University, UK
Architecture
MS
BSC
BTS
MS
Fixed
telephony
infrastructure
BTS
MS
BTS
MSC
Architecture
In a typical net-work that covers a European
country or a U.S. state, there are several
thousands of BTSs.
The BTSs are commonly called base
stations, and sometimes the acronym RBS,
Radio Base Station, is used.
Mobile Stations (MS) connect to Base Transceiver Stations (BTS), which are
controlled by Base Station Controllers (BSC). One BSC may control several BTS,
and deals with handovers, frequency assignment, etc.
Base Stations connect to Mobile Switching Centres (MSC) which connect to the
PSTN (public switched telephone network).
BTS
MS
BSC
MSC/VLR
OMC
HLR/AUC
Operator
MS:
BTS:
BSC:
MSC:
VLR:
HLR:
AUC:
OMC:
PSTN/ISDN
Mobile Station
Base Transceiver Station
Base Station Controller
Mobile Switching Centre
Visitors Location Register
Home Location Register
Authentication Centre
Operator Management Centre
Architecture
Infrastructure vendors such as Ericsson,
Nokia, and Lucent develop the mobile
system, and a mobile operator buys the
system in order to sell the service and
airtime to subscribers.
The operators usually buy handsets at the
same time. (The majority of handsets are
sold this way.)
Department of Communication Systems
Lancaster University, UK
Architecture
In other words, you never buy a mobile
phone subscription from Lucent; rather, you
buy one from AT&T, Vodaphone, or
whatever operator that serves your area.
Next, we will describe the individual parts
of the mobile system in more detail.
MOBILETERMINAL
Mobile
Network
Bluetooth/IR/Cable
Coverage area
Base station
Phone
Networks
Internet
Radio Access Network
Core Network
Other Networks
After a call is routed from the MS via the
base station, the BSC, and the core network,
it now finds the right destination network.
The core network switches determine
whether the call should be sent to a landline phone network, to another mobile
phone network, or to a different destination.
Department of Communication Systems
Lancaster University, UK
Other Networks
If the destination network is a mobile system,
this route is repeated in reverse order.
At the base station, the MS is paged with a
signal that tells it that someone wants to
reach it.
You will sometimes notice the paging traffic
if your mobile phone is close to a radio when
someone calls you.
Department of Communication Systems
Lancaster University, UK
Other Networks
The receiving user's phone rings, and the
call can be set up.
As you can see, there are no satellites
involved in a regular call with a mobile
phone (as often mistakenly thought) and
only in very special cases does this situation
occur.
Department of Communication Systems
Lancaster University, UK
Other Networks
The phones do not talk directly with each
other; rather, they communicate via
networks.
The base stations do not send the calls
directly to each other; instead, they
communicate via a network that most of the
time is buried in the ground
Department of Communication Systems
Lancaster University, UK
Other Networks
Hopefully we now have the basics about
how a mobile system works.
We will now consider some of the technical
solutions involved in separating multiple
users from each other and how we separate
sending and receiving traffic
UPLINK
DOWNLINK
Separating Users
For the majority of data communications that
take place, there is a requirement for several
users to share a common channel resource at
the same time.
This resource could be the high speed optical
fibre links between continents, the frequency
spectrum in a cellular telephone system, or the
twisted pair 'ethernet' cable in the office
Department of Communication Systems
Lancaster University, UK
Separating Users
For multiple users to be able to share a
common resource in a managed and
effective way requires some form of access
protocol that defines when or how the
sharing is to take place and the means by
which messages from individual users are to
be identified upon receipt.
Department of Communication Systems
Lancaster University, UK
Separating Users
This sharing process has come to be known
as multiplexing in wired communication
systems, and multiple access in wireless
digital communications.
In these lectures we shall concentrate on the
multiple access techniques for wireless
systems.
Department of Communication Systems
Lancaster University, UK
Separating Users
Three classes of multi-user access
techniques will be considered in these
lectures: techniques where individual users
are identified by assigning different
frequency slots, time slots, and techniques
where users are given the same time and
general frequency slots, and are identified
by different codes
Department of Communication Systems
Lancaster University, UK
Frequency Division
Multiple Access (FDMA)
Used extensively in the early telephone and
wireless multi-user communication systems,
frequency division multiple access of
users is perhaps the most intuitive form of
resource sharing.
FDMA
If a channel, such as a cable, has a transmission
bandwidth W Hz, and individual users require
B Hz to achieve their required information rate,
then the channel in theory should be able to
support W/B users simultaneously by using
bandpass modulation, and placing each user in an
adjacent slot of the available bandwidth.
FDMA
TIME
USER 1
USER 2
Example: TACS
USER 3
USER N
FREQUENCY
FDMA
Immediately, we see that the efficiency of
the multiplexing is governed by how
effectively the transmission bandwidth is
constrained by each user.
It is also dependent on how selective the demultiplexing system is at filtering out the
modulation corresponding to each user.
Department of Communication Systems
Lancaster University, UK
FDMA
With frequency division multiplexing, the data
rate and hence modem design for each user
remains unchanged by the requirement to operate
a multi-user system, and the only additional
circuitry is for frequency conversion to the
assigned slot.
The user will typically be assigned the frequency
slot for the duration of the message.
Department of Communication Systems
Lancaster University, UK
FDMA
FDMA is widely used in wireless
communications systems where the radio
environment creates several challenges for
any multiple access method owing to the
unpredictable and time varying nature of the
communications channel.
FDMA
One of the biggest challenges is the very large
variations in received signal power that arise from
users in different frequency slots due to the socalled near-far effect.
A radio user that is very near to a base-station
receiver will produce a much stronger signal than
that from a distant (far) user operating on the
extreme of the communication range.
Department of Communication Systems
Lancaster University, UK
FDMA
TIME
Near-far
Fading
FREQUENCY
FDMA
A great deal of effort is placed on
controlling the bandwidth and side-lobe
energy of digital modulation formats, such
as CPFSK, and on designing modulation
formats that are not overly sensitive to
amplifier distortion, such as /4 QPSK, are
all driven by this near-far problem in the
wireless application.
Department of Communication Systems
Lancaster University, UK
FDMA
Other challenges in the radio environment
include dealing with the frequency
uncertainty for any individual user caused
by Doppler shift and local oscillator error.
This inevitable error requires guard-bands
to be allocated between frequency slots,
thus sacrificing some of the efficiency of
the FDMA scheme.
Department of Communication Systems
Lancaster University, UK