Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

4G and its Evolution

Technology and Specifications of 4G

White Paper
Mahesh G 4G Mobile Communications

4G Technology and Specifications

About the Author


The document is written by Mahesh G Emp No. 256325 Q BMG-MNT- !" Tata #onsu$tancy %er&ices Tide$ 'ar() No *) !a+i& Gandhi %a$ai) Taramani) #hennai , 6-- ..3 /ndia Emai$0 mahesh*.12tcs.com Te$ephone0 -**66.63534

About the Domain


Though many technologies currently available for wired and wireless, The 4G concept supports the provisioning of multiple types of services, ranging from simple network access to complex multimedia virtual reality, including voice communication services, which are themselves a challenge in packet-based mobile communications environments. 4G mobile data transmission rates are planned to be up to !! megabits per second on the move and !!!gigbits per second stationary, this is a phenomenal amount of bandwidth, only comparable to the bandwidth workstations get connected directly to a "#$. The intent of this paper is to describe about 4G, its architecture, specifications, and the technology. This paper also overviews technical physical layer and medium access layer features, further developments and threats of the 4G, %igher layer issues in 4G. $ext, the features of the wireless broadband networks are compared and a conclusion is drawn.

&onfidential

4G Technology and Specifications

CONTENTS
. ,. /. 4. 1. '$T()*+&T')$ 4G #$* 'TS -.#T+(.S 4G '$'T'#T'0. 4G #$* 'TS &%#"".$G.S 4G $.T2)(3 #(&%'T.&T+(.

T%. G.$.('& 4G 4)5'". $.T2)(3 #(&%'T.&T+(. '607 4G $.T2)(3 #(&%'T.&T+(. '$T.""'G.$T 4.*'#T')$ #(&%'T.&T+(. -)( 4G &()SS "#8.( &8"'$*.( #66()#&% 7. 5+S'$.SS 4)*." )- 4G $.T2)(3S 9. 4G $.T2)(3 S6.&'-'&#T')$S 6%8S'&#" #$* 4#& "#8.( &%#$."" #&&.SS .(()( &)$T()" &)*'$G )-*4 4)5'"'T8 4#$#G.4.$T &)$G.ST')$ &)$T()" ;+#"'T8 )- S.(0'&.

:. %'G%.( "#8.( 'SS+.S '$ 4G

<. 5.$.-'TS !. 4G 0S )T%.( T.&%$)")G'.S 7. 9. :. &)$&"+S')$S #&3$)2".*G.4.$TS (.-.(.$&.S

&onfidential

4G Technology and Specifications Introduction


t the end o5 the .4*-6s) the 5irst radio te$ephone ser&ice was introduced) and was desi1ned to users in cars to the pub$ic $and-$ine based te$ephone networ(. Then) in the 6-6s) a system $aunched by Be$$ %ystems) ca$$ed /MT%) or) 7/mpro&ed Mobi$e Te$ephone %er&ice8) brou1ht 9uite a 5ew impro&ements such as direct dia$in1 and more bandwidth. The &ery 5irst ana$o1 systems were based upon /MT% and were created in the $ate 6-s and ear$y 3-s. The systems were ca$$ed 8ce$$u$ar8 because $ar1e co&era1e areas were sp$it into sma$$er areas or 8ce$$s8) each ce$$ is ser&ed by a $ow power transmitter and recei&er.

The G or -irst Generation


.G was an ana$o1 system) and was de&e$oped in the 3-6s) .G had two ma+or impro&ements) this was the in&ention o5 the microprocessor) and the di1ita$ trans5orm o5 the contro$ $in( between the phone and the ce$$ site. .G ana$o1 system 5or mobi$e communications saw two (ey impro&ements durin1 the .43-s0 the in&ention o5 the microprocessor and the di1iti:ation o5 the contro$ $in( between the mobi$e phone and the ce$$ site. d&ance mobi$e phone system ; M'%< was 5irst $aunched by the =% and is a .G mobi$e system. Based on >?M ) it a$$ows users to ma(e &oice ca$$s in . country

,G, or Second Generation


2G 5irst appeared around the end o5 the .4@-6s) the 2G system di1iti:ed the &oice si1na$) as we$$ as the contro$ $in(. This new di1ita$ system 1a&e a $ot better 9ua$ity and much more capacity ;i.e. more peop$e cou$d use their phones at the same time<) a$$ at a $ower cost to the end consumer. Based on T?M ) the 5irst commercia$ networ( 5or use by the pub$ic was the G$oba$ system 5or mobi$e communication ;G%M<.

/G or Third Generation
3G systems promise 5aster communications ser&ices) entai$in1 &oice) 5acsimi$e and /nternet data trans5er capabi$ities. The aim o5 3G is to pro&ide these ser&ices anytime) anywhere throu1hout the 1$obe) with seam$ess roamin1 between standards. /T=6s /MT-2--- is a 1$oba$ standard 5or 3G and has opened new doors to enab$in1 inno&ati&e ser&ices and app$ication 5or instance) mu$timedia entertainment) and $ocation-based ser&ices) as we$$ as a who$e $ot more. /n 2--.) Aapan saw the 5irst 3G networ( $aunched.3G techno$o1y supports around .** Bbps) with hi1h speed mo&ement) i.e. in a &ehic$e. 3@* Bbps $oca$$y) and up to 2Mbps 5or 5iCed stations) i.e. in a bui$din1.

4G or -orth Generation

>or . and 2G standards) bandwidth maCimum is 4.6 BbitDsec) this is approCimate$y 6 times s$ower than an /%?N ;/nte1rated ser&ices di1ita$ networ(<. !ates did increase by a 5actor o5 3 with newer handsets to 2@.@(bps. This is rare$y the speed thou1h) as in crowded areas) when the networ( is busy) rates do drop dramatica$$y. Third 1eneration mobi$e) data rates are 3@* (bps ;down$oad< maCimum) typica$$y around 2--(bps) and 6*(bps up$oad. These are comparab$e to home broadband connections.

&onfidential

4G Technology and Specifications

>ourth 1eneration mobi$e communications wi$$ ha&e hi1her data transmission rates than 3G. *G mobi$e data transmission rates are p$anned to be up to .-- me1abits per second on the mo&e and .---1i1bits per second stationary) this is a phenomena$ amount o5 bandwidth) on$y comparab$e to the bandwidth wor(stations 1et connected direct$y to a " N. To understand *G) we need to (now about 3G. %o how did 3G startE The idea didn6t come 5rom networ( operators) but 5rom de&ice manu5actures. /n .446 Nippon Te$ephone F Te$e1raph ;NTT< and Ericsson started de&e$opment o5 3GG then in .443 in the =% the T/ ;Te$ecommunications /ndustry ssociation< chose #?M ;#ode ?i&ision Mu$tip$e ccess< as a techno$o1y 5or 3GG and then in .44@ the ET%/ ;European te$ecommunications %tandards /nstitute< a$so chose #?M G in the end) in .44@ wideband #?M or H-#?M and cdma2--- were decided 5or the =ni&ersa$ Mobi$e Te$ecommunications %ystem ;=MT%<. The two ma+or radio standards used 5or 3G are H-#?M ;wideband code di&ision mu$tip$e access<) and #?M 2---. H-#?M is used in Europe) where #?M 2--- is used in the =% . /n #?M ) one si1na$ carries the data) this is then mu$tip$ied with a si1na$ with a 5aster rate) that his more bandwidth) it uses T?M ;Time ?i&ision Mu$tip$eCin1<. #?M 2-- uses #?M ;common code di&ision mu$tip$eCin1<. Now we need to discuss the di55erent access techno$o1ies) these are >?M ) T?M and #?M . The most common ana$o1 system is >?M ) or) >re9uency ?i&ision Mu$tip$e ccess. /t is a method where the spectrum is cut up into di55erent 5re9uencies and then this chun( 1i&en to the users. t one time on$y one user is assi1ned to a 5re9uency. Because o5 this the 5re9uency is c$osed) unti$ the ca$$ is ended) or it is passed on to another 5re9uency. >or a proper ca$$ to ta(e p$ace) two 5re9uencies are needed) one 5or sendin1 and one 5or recei&in1) >?M has been used 5or 5irst 1eneration ana$o1 systems on$y) this is due to the $ar1e bandwidth wasta1e hi1h$i1hted abo&e. T?M or Time ?i&ision Mu$tip$e ccess ma(es use o5 the who$e a&ai$ab$e spectrum) un$i(e >?M . /nstead o5 sp$ittin1 the s$ots by 5re9uency) it sp$its them by time) o&er a$$ o5 the 5re9uency. Each subscriber is 1i&en a time s$ot) as opposed to a 5re9uency. There5ore many uses can sit on one 5re9uency) and ha&e di55erent time s$ots) because the time s$ots are switched so rapid$y) it seems $i(e the channe$ is permanent$y connected. T?M is used 5or 2G networ(s. #?M or #ode ?i&ision Mu$tip$e ccess uses the spread spectrum method) the way it wor(s means it6s hi1h$y encrypted) so it6s no surprise it was de&e$oped and used by the mi$itary. =n$i(e >?M ) #?M a$$ows the user to sit on a$$ o5 the a&ai$ab$e 5re9uencies at the same time) and hop between then. Each ca$$ is identi5ied by its uni9ue code) hence the term #ode ?i&ision. #?M is &ery bandwidth e55icient. /t a$so a$$ows 5or so5t hand o55) meanin1 it can communicate with more than one base station at any one time) &ery handy isn6t itE No wonder it was chosen 5or 3G.

&onfidential

4G Technology and Specifications

.volution of the mobile value chain towards 4G.

)nto 4G...

ourth ;*G< 1eneration mobi$e communication systems tend to mean di55erent

thin1s to di55erent peop$e0 5or some it is mere$y a hi1her-capacity ;e.1.) .-- MbDs< new radio inter5ace) whi$e 5or others it is an interwor(in1 o5 ce$$u$ar and wire$ess " N techno$o1ies that emp$oys a &ariant o5 the Mobi$e /'&6 mobi$ity mana1ement protoco$ ;e.1.) Iierarchica$ Mobi$e /'&6< 5or inter-system hando55 and /ET> techno$o1ies 5or seam$ess roamin1. This now wide$y accepted &ision s(etches a hetero1eneous networ( in5rastructure comprisin1 di55erent wire$ess access systems ;e.1.) G%MDG'!%) =MT%) ?JB-T) I '%) H" N< in a comp$ementary manner) where the user) supported by hisDher persona$ inte$$i1ent a1ent;s<) en+oys untethered connecti&ity and ubi9uitous access to app$ications o&er the most e55icient combination o5 a&ai$ab$e systems.

&onfidential

4G Technology and Specifications


&ai$abi$ity o5 the networ( ser&ices anywhere) at anytime) can be one o5 the (ey 5actors that attract indi&idua$s and institutions to the new networ( in5rastructures) stimu$ate the de&e$opment o5 te$ecommunications) and prope$ economies. This bo$d idea has a$ready made its way into the te$ecommunication community brin1in1 new re9uirements 5or networ( desi1n) and en&isionin1 a chan1e o5 the current mode$ o5 pro&idin1 ser&ices to customers. The emer1in1 new communications paradi1m assumes a user to be ab$e to access ser&ices independent$y o5 her or his $ocation) in an a$most transparent way) with the termina$ bein1 ab$e to pic( the pre5erred access techno$o1y at current $ocation ;ad-hoc) wired) wire$ess " N) or ce$$u$ar<) and mo&e between techno$o1ies seam$ess$y i.e. without noticeab$e disruption. =ni5ied) secure) mu$ti-ser&ice) and mu$tip$e-operator networ( architectures are a&ai$ab$e in *G networ(s. The *G concept supports the pro&isionin1 o5 mu$tip$e types o5 ser&ices) ran1in1 5rom simp$e networ( access to comp$eC mu$timedia &irtua$ rea$ity) inc$udin1 &oice communication ser&ices) which are themse$&es a cha$$en1e in pac(et-based mobi$e communications en&ironments. ?ue to the hetero1eneity o5 the access techno$o1ies) the /nternet 'rotoco$ &ersion 6 ;/'&6< is bein1 tar1eted as the common denominator across mu$tip$e access techno$o1ies) and ma(e the so$ution basica$$y independent o5 the under$yin1 techno$o1y - and there5ore 5uture-proo5. Iowe&er) 5ittin1 such important concepts as support 5or Qua$ity o5 %er&ice ;Qo%<) uthentication) uthorisation) ccountin1 and #har1in1 ; #< and mobi$ity into the nati&e /nternet architecture poses numerous di55icu$ties and is a rea$ cha$$en1e. There5ore) the primary tar1et o5 this paper is to present a so$ution 5or Qo% support in mobi$e en&ironments.. /n order to do so) we ma(e 5re9uent re5erences to the prob$em o5 inte1ration o5 Qo%) # and mobi$ity. /n the course o5 the paper we discuss the methods that $et us create and eCp$oit the intrinsic associations between the ser&ice $e&e$ a1reements eCpressed in user pro5i$es) and the networ( contro$ mechanisms capab$e to monitor networ( usa1e per ser&ice and per user) in order to pro&ide these ser&ices whi$e the user mo&es and the termina$ chan1es access techno$o1ies. The proposed architecture supports networ( ser&ices) in a secure and auditab$e way. Both user-to-networ( inter5aces and inter-operator inter5aces are de5ined) so that mu$tip$e ser&ice pro&iders can interoperate. The architecture is ab$e to support mu$timedia ser&ices) and has been 5urther optimi:ed 5or &oice ser&ices. Joice ser&ices are now amon1 the most demandin1 in terms o5 networ( desi1n) imposin1 hard $imits on networ( per5ormance. /n order to hand$e these ser&ices we wi$$ use the ECpedited >orward ;E>< concept o5 the di55erentiated ser&ices 5ramewor(. *G wi$$ pro&ide unconcei&ab$e amounts o5 bandwidth to the pa$m o5 a user. Matchin1 current "oca$ rea Networ( speeds) *G networ(s wi$$ pro&ide .--MBps on the mo&e. This is enou1h 5or studio 9ua$ity &ideo) mu$ti channe$ surround sound and much more. *G wi$$ be based on K>?M , the neCt 1eneration in access techno$o1ies ;read the technica$ section 5or more in5o on K>?M<) *G wi$$ chan1e the way we wor() $i&e and p$ay. #heap end user costs) 5ast) a$ways on) re$iab$e connecti&ity) where e&er you are) whate&er you6re doin1. %ome peop$e &iew 3G as a stop 1ap unti$ the rea$ *G networ( arri&es) somethin1 which is due around 2-.-) and wi$$ impact e&ery one) e&erywhereL

&onfidential

4G Technology and Specifications Features of 4G Wireless Systems


.. 'ersona$i:ation0 The operator may send the data to the user dependin1 on his pre5erence or the data can be 5i$tered at the user end dependin1 upon his re9uirement. 2. =ser 5riend$y0 ?ue to the desi1n in transparency in the desi1n user can uti$i:e the ser&ice proper$y. 3. Ietero1eneity0 =bi9uitous connection can be eCperienced with networ( hetero1eneity. Termina$ Ietero1eneity supports di55erent types o5 termina$s in terms o5 si:e) portabi$ity) #omp$eCity. *. Ii1h =sabi$ity0 The techno$o1y wi$$ support the end users anytime and anywhere. 5. Transmission cost o5 &arious mu$timedia ser&ices at a &ery $ow cost. 6. %upport interacti&e mu$timedia) &oice) &ideo) wire$ess internet and other broadband ser&ices. 3. Ii1h speed) hi1h capacity and $ow cost per bit. @. G$oba$ mobi$ity) ser&ice portabi$ity) sca$ab$e mobi$e networ(s. 4. %eam$ess switchin1) &ariety o5 ser&ices based on Qua$ity o5 %er&ice ;Qo%< re9uirements .-. Better schedu$in1 and ca$$ admission contro$ techni9ues. ... d hoc networ(s and mu$ti-hop networ(s.

.2. Mobi$ity o5 users across mu$tip$e termina$s. .3. Mobi$ity o5 termina$s across mu$tip$e techno$o1ies. .*. #on5identia$ity both o5 user tra55ic and o5 the networ( contro$ in5ormation.

&onfidential

4G Technology and Specifications Glo!al 4G "pen #o!ile Initiati$es


The mobi$e race to inno&ate inc$udes the 5o$$owin1 inno&ations0 mobi$e communications comprise two steps0 ccess to the mobi$e networ( and ccess to the mobi$e ser&ices. Traditiona$$y) these two steps are a$$ contro$$ed by one operator in a c$osed and proprietary way. /n the *G mobi$e era) the access to the mobi$e ser&ices wi$$ be e&o$&ed to an open Mobi$e #$oud so that it is 5u$$y open to any de&e$opers and pro&iders. /n this way) any non-wire$ess industries) such as Goo1$e) Microso5t) Krac$e) % ') GM) and Ban( o5 merica can pro&ide ser&ices 5or their mobi$e users. The access to the mobi$e networ( is sti$$ contro$$ed by the traditiona$ wire$ess operators such as TFT) Jeri:on) T-Mobi$e and #hina Mobi$e. ,. The mobi$e de&ice system architecture wi$$ be open in order to con&er1e mu$tip$e !TTs ;radio transmission techno$o1ies< in one same de&ice. %ame as $aptop computer) the 5uture %martphone wi$$ be based on open wire$ess architecture ;KH < techno$o1y which means) when you chan1e the wire$ess standards) you do not need to chan1e phone. /t is tota$$y di55erent 5rom current mu$ti-standards phone which is in c$osed system architecture) and users can not remo&e the unused !TT modu$es and basica$$y cannot do anythin1 on the mobi$e phone system. /n the KH system) you can +ust chan1e !TT card in your %martphone to switch your wire$ess standards) or you can inte1rate mu$tip$e wire$ess standards in one !TT %/M card. Based on this KH p$at5orm) you can inte1rate home phone) o55ice phone and mobi$e phone into one common 'ersona$ de&ice - it is more beyond +ust a phone. /n 5act) this *G mobi$e de&ice is a system to brin1 the wor$d to your hand) or we ca$$ it iIand - the Hor$d in Iand) which is better than ca$$in1 it an i'hone. /. ny portab$e consumer e$ectronics de&ice can be a mobi$e phone by insertin1 the KH -powered mobi$e !TT;s< card. This approach tru$y is con&er1in1 the mobi$e wire$ess techno$o1y with the computer techno$o1y by pro&idin1 the KH &irtua$i:ation $ayer between the hi1h-$ayer computer-based K% ;operatin1 systems< F app$ications so$utions and the under$yin1 wire$ess transmission-based di55erent mobi$e networ(s access means. *. More brea(throu1h techno$o1ies are bein1 de&e$oped 5or e55icient uti$i:ation o5 wire$ess spectrum) and the dynamic and open spectrum mana1ement. Hire$ess is tota$$y di55erent 5rom wired communications) and there5ore the o&era$$ per5ormance re$ies on both system per5ormance and transmission per5ormance where spectrum is one o5 the (ey issues. 1. 'ower e55iciency is another critica$ issue 5or mobi$e de&ice. The system architecture must be open to enab$e remo&ab$e o5 unused modu$es) and the processin1 architecture must be optimi:ed to the $owest possib$e in terms o5 the who$e system per5ormance. Meanwhi$e) the !> radio modu$es shou$d be narrowed to the minima$ meetin1 the basic re9uirements o5 necessary !TTs.

. The

&onfidential

4G Technology and Specifications 4G &hallenges and Solutions


.. Mu$ti-access inter5ace) timin1 and reco&ery. 2. Ii1her 5re9uency reuse $eads to sma$$er ce$$s that may cause intra-ce$$ inter5erence or hi1her noise 5i1ures due to reduced power $e&e$s. 3. The ?i1ita$ to ana$o1 con&ersions at hi1h data rates) mu$tiuser detection and estimation ;at base stations<) smart antennas and comp$eC error contro$ techni9ues as we$$ dynamic routin1 wi$$ need sophisticated si1na$ processin1. *. /ssues in the inter5ace with the ad hoc networ(s shou$d be sorted out.*G systems are eCpected to interact with other networ(s $i(e the B$uetooth) hiper$an) /EE@-2...b) etc. 5. Joice o&er mu$ti-hop networ(s is $i(e$y to be an interestin1 prob$em because o5 the strict de$ay re9uirements o5 &oice. 6. %ecurity wi$$ be an important issue. 3. new /' protoco$ mi1ht be needed because o5 the &ariab$e Qo% ser&ices and the networ( shou$d do 7better than best 7e55ort. @. Networ(in1 protoco$s that adapt dynamica$$y to the chan1in1 channe$ conditions. 4. %eam$ess roamin1 and seam$ess trans5er o5 ser&ices. .- ?esi1nin1 a sin1$e user termina$ to operate in &arious networ(s and to o&ercome some $imitations $i(e si:e o5 the de&ice. so5tware radio can be used to ma(e sure that the termina$ wi$$ wor( in a$$ networ(s. .. Termina$ Mobi$ity0 To $ocate and update the $ocations o5 &arious termina$s. Iere we can use si1na$in1 schemes and the 5aster hando55Ms can be used to achie&e termina$ mobi$ity. .2 ?ue to the hetero1eneity in the networ( the security issues wi$$ be a cha$$en1e to maintain. By imp$ementin1 security hando55 we can impro&e the security 5eatures o5 the networ(. .3 =sin1 tree $i(e topo$o1ies in the networ( to minimi:e the 5ai$ures in the networ(. He can use 5ai$ure reduction protoco$s to correct the 5ai$ures in the networ(. .* /mp$ementin1 border$ess mobi$ity to end users without modi5yin1 the ser&ers in the hetero1eneous system) by proposin1 personne$ mobi$ity 5rames we can imp$ement seam$ess mobi$ity.

&onfidential

'(

4G Technology and Specifications 4G )et*or+ ,rchitecture The generic 4G mo!ile net*or+ architecture

The architecture consists o5 common core Networ() which in turn is connected to di55erent other wired and wire$ess networ(s. /t6s connected to '%TN ;public switched telephone network< /%?N ;'ntegrated Services *igital $etwork< throu1h GG%N ;Gateway G6(S Support $ode=. GGS$ is a main

component of the G6(S network. The GGS$ is responsible for the interworking between the G6(S network and external packet switched networks, like the 'nternet and >.,1 networks.
/t6s connected to 2G throu1h %G%N to BT% &ia B%# ;Business systems connection<. %G%N ;Serving G6(S Support $ode= is responsible for the delivery of data packets from and to the mobile stations within its geographical service area.BT% ;base transreceiver

station= is a piece of e?uipment that facilitates wireless communication between user e?uipment @+.= and a network.
/t6s connected to 31 throu1h %G%N to Node B &ia !N#. The !adio ccess Networ( consists o5 new networ( e$ements) (nown as Node B and !adio Networ( #ontro$$ers ;!N#s<. Node B is comparab$e to the Base Transcei&er %tation in 2G wire$ess networ(s. !N# rep$aces the Base %tation #ontro$$er) and a$so connected to di55erent networ(s $i(e H" N access networ(s) d-hocD' N Mobi$e Networ(s and protoco$s $i(e %/';The Session 'nitiation 6rotocol= is a signaling

protocol, widely used for setting up and tearing down multimedia communication sessions such as voice and video calls over the 'nternet.

&onfidential

''

4G Technology and Specifications I-$6 4G ).TW"/0 ,/&1IT.&T2/.


The *G architecture discussed here is /'&6-based) supportin1 seam$ess mobi$ity between di55erent access techno$o1ies. Mobi$ity is a substantia$ prob$em in such en&ironment) because inter-techno$o1y hando&ers ha&e to be supported. Iere) we used Ethernet ;@-2.3< 5or wired accessG Hi->i ;@-2...b< 5or wire$ess " N accessG and H-#?M - the radio inter5ace o5 =MT% - 5or ce$$u$ar access. Hith this di&ersity) mobi$ity cannot be simp$y hand$ed by the $ower $ayers) but needs to be imp$emented at the networ( $ayer. n 8/'&6-based8 mechanism has to be used 5or interwor(in1) and no techno$o1y-interna$ mechanisms 5or hando&er) neither on the wire$ess " N nor on other techno$o1y) can be used. %o) in 5act no mobi$ity mechanisms are supported in the H-#?M ce$$s) but instead the same /' protoco$ supports the mo&ement between ce$$s. %imi$ar$y) the @-2... nodes are on$y in B%% modes) and wi$$ not create an E%%0 /'&6 mobi$ity wi$$ hand$e hando&er between ce$$s.

>i1ure i$$ustrates some o5 the hando&er possibi$ities in such networ( with a mo&in1 user. >our administrati&e domains are shown in the 5i1ure with di55erent types o5 access techno$o1ies. Each administrati&e domain is mana1ed by an # system. t $east one networ( access contro$ entity) the Qo% Bro(er) is re9uired per domain. ?ue to the re9uirements o5 5u$$ ser&ice contro$ by the pro&ider) a$$ the hando&ers are eCp$icit$y hand$ed by the mana1ement in5rastructure throu1h /'-based protoco$s) e&en when they are intratechno$o1y) such as between two di55erent ccess 'oints in @-2...) or between two di55erent !adio Networ( #ontro$$ers in H#?M . $$ networ( resources are mana1ed by the networ( pro&ider) whi$e the user on$y contro$s its $oca$ networ() termina$) and app$ications. %ummari:in1 >i1ure) the (ey entities are0 user - a person or company with a ser&ice $e&e$ a1reement ;%" < contracted with an operator 5or a speci5ic set o5 ser&ices. N MT ;Mobi$e Termina$< - a termina$ 5rom where the user accesses ser&ices. Kur networ( concept supports termina$ portabi$ity) which means that a termina$ may be shared amon1 se&era$ users) a$thou1h not at the same time. N ! ; ccess !outer< - the point o5 attachment to the networ() which ta(es the name o5 !G ;!adio Gateway< - 5or wire$ess access ;H#?M or @-2...<. N ' ;'a1in1 1ent< - entity responsib$e 5or $ocatin1 the MT when it is in 8id$e mode8 whi$e there are pac(ets to be de$i&ered to it.

&onfidential

'2

4G Technology and Specifications


N Qo% Bro(er - entity responsib$e o5 mana1in1 one or more !sD Gs) contro$$in1 user access and access ri1hts accordin1 to the in5ormation pro&ided by the # %ystem. N # %ystem - the uthentication) uthori:ation) ccountin1 and #har1in1 %ystem) responsib$e 5or ser&ice $e&e$ mana1ement ;inc$udin1 accountin1 and char1in1<. /n this paper) 5or simp$icity) meterin1 entities are considered an inte1ra$ part o5 this # system. N NM% ;Networ( Mana1ement %ystem< - the entity responsib$e 5or mana1in1 and 1uaranteein1 a&ai$abi$ity o5 resources in the #ore Networ() and o&era$$ networ( mana1ement and contro$.

Intelligent mediation architecture for 4G

/n the abo&e dia1ram) Networ( a1ent ad&ertises their bearer ser&ice o55erin1s to the user6s mediation a1ent. He consider bearer ser&ice o55erin1s to be a combination o5 Qo% $e&e$ and pricin1 mode$ supported and app$ied) respecti&e$y) by the wire$ess networ( represented by the networ( a1ent. 'ro&isionin1 o5 wire$ess networ( bearer ser&ices under a who$esa$e mode$ o5 peerin1 a1reements to ad+acent networ( domains. %er&ice a1ents re5er to app$ication 5unctiona$ity that may interact with mobi$e termina$ a1ents and networ( a1ents 5or the purpose o5 Qo% mana1ement and Qo% adaptation. ser&ice a1ent wi$$ in5orm the mobi$e termina$ a1ent and the networ( a1ents o5 the Qo% !e9uirements o5 their tra55ic 5$ows and re1ister an appropriate ca$$bac( inter5ace to support subse9uent noti5ications and Qo% adaptation 5or these tra55ic 5$ows. Mobi$e networ( a1ents must abide by a common networ( in5ormation mode$ so that an unambi1uous de5inition o5 networ( bearer ser&ices is possib$e) e.1.) when ne1otiatin1 with other a1ents. !ea$i:in1 that each a1ent represents the interests o5 a particu$ar sta(eho$der in the mobi$e ser&ice pro&ision ;i.e.) mobi$e networ( operator) app$ication pro&ider) mobi$e user<) we assume that it operates under an indi&idua$ po$icy. Notab$y) the resu$tin1 dynamics are that o5 an open mar(et where di55erent 1oods are ad&ertised at wide$y (nown prices and se$5ish consumers may 5ree$y choose 5rom a wide ran1e o5 producers.

&onfidential

'3

4G Technology and Specifications


MT ;Mobi$e Termina$< - a termina$ 5rom where the user accesses ser&ices. Kur networ( concept supports termina$ portabi$ity) which means that a termina$ may be shared amon1 se&era$ users) a$thou1h not at the same time.

&ross 3ayer cylinder approach

Hith the he$p o5 cross $ayer cy$inder approach we can 1ain (now$ed1e about optimi:ation o5 iteration between communication $ayers .The importance o5 $ayered approach has made it a desi1n princip$e rather than a common desi1n pattern. This $eads the *G architecture to ha&e a architecture o5 its own (ind. #ross $ayer a$$ows sharin1 in5ormation amon1 the &arious $ayers and optimi:ation can be done at e&ery $ayer separate$y.

4usiness #odel of 4G )et*or+

&onfidential

'4

4G Technology and Specifications


The current mode$ assumes there are re$ationships between the end user) the ser&ice pro&ider) and the networ( operator. /n the 4G worlds) the number o5 access networ(s and there5ore the number o5 networ( operators wi$$ increase rapid$y. Especia$$y the construction o5 many so-ca$$ed 7hotspotsO) urban areas with Hire$ess " N co&era1e) wi$$ cause this. Both the end user and the ser&ice pro&ider do not want to be bothered with the pecu$iarities o5 these networ(s) i.e. end users sti$$ want to use the ser&ices o55ered by ser&ice pro&iders irrespecti&e o5 the networ( they are connected to. This as(s 5or a ser&ice centric approach where the end user) the ser&ice pro&ider and networ( operator are $oose$y coup$ed throu1h a Service Support ro$e) Two main responsibi$ities o5 %er&ice %upport are service aggregation and network integration %er&ice a11re1ation ;% < enab$es ubi9uitous ser&ice pro&isionin1 to end users) whereas networ( inte1ration ;N/< ensures that this can be rea$i:ed re1ard$ess o5 the networ( the end user is connected to. The end user bene5its 5rom bein1 ab$e to access hisDher subscribed ser&ices anywhere and anytime.

End =ser /dentities and %er&ices


Third party ser&ice pro&iders pro&ide end user ser&ices. These ser&ice pro&iders ha&e estab$ished a $e1a$ re$ationship or %er&ice "e&e$ 1reement ;%" < with one or more ser&ice a11re1ators. The ser&ices can bene5it not on$y 5rom a $ar1e customer base) but cou$d a$so adapt their ser&ices and app$ications based on in5ormation 5rom the networ( pro&ided &ia the a11re1ators. /t is en&isa1ed that the user6s $ocation can be obtained 5rom the networ( inte1rator ;and there5ore 5rom access networ(< to dep$oy $ocation-based ser&ices. The concept o5 user identity p$ays an important ro$e in inte1rated ser&ice de$i&ery. This ran1es 5rom authentication and access contro$ to ser&ices) to accountin1 and bi$$in1G to be ab$e to char1e the correct end user 5or usin1 his &a$ue-added conteCt-based ser&ices.

&onfidential

'5

4G Technology and Specifications

Service Aggregator
The ro$e o5 ser&ice a11re1ator ;% < is two5o$d. Kn the one hand the % acts as an intermediary between a end userDsubscriber and mu$tip$e ser&ices ;the ser&ice o55erin1 o5 the % <. Kn the other hand) 5or %er&ice 'ro&ider the % acts as an intermediary to mu$tip$e di55erent networ( inte1rators) such that ser&ices do not need to be concerned with issues e$iminatin1 the need 5or $i(e determinin1 on which networ( a subscriber is current$y $ocated acti&e. /n this mode$) end users eCp$icit$y subscribe to the % . The % mana1es these subscriptions and a$so ta(es care o5 bi$$in1G based on accountin1 in5ormation recei&ed 5rom ser&ices) networ( inte1rators) and the % itse$5. /n this way the % not on$y pro&ides sin1$e si1n-on) but a more 1enera$ sin1$e point o5 contact.

)et*or+ Integration
The networ( inte1ration ;N/< enab$es end users to seam$ess$y roam across hetero1eneous networ(s and their administrati&e domains. To support the seamlessness aspect is essentia$ 5or this 5unctiona$ity. The N/ pro&ides the basic networ( mana1ement 5unctiona$ity and pro&ides an abstraction o5 the under$yin1 networ(s. This pro&ides the i$$usion o5 one &irtua$ networ( towards upper ser&ice $ayers and ser&ices) and a$so such as networ( inte1ration speci5ic aspects to endusers. >or eCamp$e) it pro&ides transparent and inte1rated authentication such that end users are not re9uired to re-$o1in e&ery time the access networ( chan1es. >or ser&ices) N/ ta(es care o5 connecti&ity , bein1 ab$e to reach the end user termina$. This in&o$&es networ( addressin1 issues and techno$o1ies such as Mobi$e /'.

&onfidential

'6

4G Technology and Specifications 4G )et*or+ Specification


Kne may wonder how *G can pro&ide a .- times increase in data trans5er o&er 3G. This speed can be achie&ed throu1h Krtho1ona$ >re9uency ?i&ision Mu$tip$eCin1 ;K>?M<. K>?M can not on$y trans5er data at speed o5 more than .-- Mbps) but it can a$so e$iminate inter5erence that impairs hi1h speed si1na$s.

-hysical and #,& 3ayer specifications


Kne promisin1 under$yin1 techno$o1y to accomp$ish the di&isi&eness is mu$ti-carrier modu$ation) a deri&ati&e o5 5re9uency di&ision mu$tip$eCin1. M#M was ear$ier used in ?%" modems and di1ita$ audio-&ideo broadcasts. /t is a baseband process that uses para$$e$ e9ua$ bandwidth channe$s to transmit in5ormation. Norma$$y imp$emented with >ast >ourier trans5orm ;>>T< techni9ues) M#MMs ad&anta1es inc$ude better per5ormance in the inter symbo$ inter5erence ;/%/< en&ironment) and a&oidance o5 sin1$e 5re9uency inter5erers. Iowe&er) M#M increases the pea(-to-a&era1e ratio ;' J!< o5 the si1na$) and to o&ercome /%/ a cyc$ic eCtension or 1uard band must be added to the data. Two di55erent types o5 M#M are $i(e$y candidates 5or *G are mu$ti-carrier #?M ortho1ona$ >?M usin1 T?M . and

%imi$ar to sin1$e carrier #?M systems) the users are mu$tip$eCed with ortho1ona$ codes to distin1uish users in M#-#?M . Iowe&er) in M#-#?M ) each user can be a$$ocated se&era$ codes) where the data is spread in time or 5re9uency. Either way) mu$tip$e users access the system simu$taneous$y. /n K>?M with T?M ) the users are a$$ocated time inter&a$s to transmit and recei&e data. ?i55erences between K>?M with T?M and M#-#?M can a$so be seen in the types o5 modu$ation used in each subcarrier. Typica$$y) M#-#?M uses 9uadrature phase-shi5t (eyin1 ;Q'%B<) whi$e K>?M with T?M cou$d use more hi1h-$e&e$ modu$ations ;I"M<) such as) mu$ti$e&e$ 9uadrature amp$itude modu$ation ;M-Q M< ;where M P * to 256<. Iow-e&er) to optimi:e o&era$$ system per5ormance) adapti&e modu$ation can be usedG where the $e&e$ o5 Q M 5or a$$ subcarriers is chosen based on measured parameters.

&hannel ,ccess
The a$$ocation o5 the spreadin1 codes or the time s$ots can be done in such a way that the throu1hput is maCimi:ed. >or eCamp$e) a$$ the resources can be a$$ocated to a user whose channe$ is &ery c$ean and users who ha&e &ery noisy channe$s can be a$$ocated $itt$e amount o5 bandwidth ti$$ their channe$ becomes better. Iowe&er) the a$$ocation shou$d maintain certain amount o5 5airness whi$e distributin1 the resources.

.rror control coding


/n *G systems rate-adapti&e codin1 schemes can be used which can ma(e use o5 the channe$ in5ormation 5rom the measured parameters or 5eedbac( 5rom the Mobi$e Termina$ ;MT<. Iybrid !Q scheme can be used to minimi:e the o&erhead in case o5 retransmission. %pace time codes) mu$tip$e antennas systems $i(e the smart antennas can be used to 5urther impro&e the data rates

&onfidential

'7

4G Technology and Specifications "rthogonal Fre5uency 6i$ision #ultiple7ing


K>?M is a communications techni9ue that di&ides a communications channe$ into a number o5 e9ua$$y spaced 5re9uency tones ;bands<. K>?M is a 5orm o5 mu$ti-carrier modu$ation ;M#M< where a sub-carrier within each 5re9uency band is modu$ated to carry a portion o5 the user in5ormation. communications data stream is e55ecti&e$y sp$it into N para$$e$ $ow bandwidth modu$ated data streams. Each sub-carrier o&er$aps) but they are a$$ ortho1ona$ to each other) such that they do not inter5ere with one another.

Basic K>?M Transmitter and recei&er

Each o5 the sub-carriers has a $ow symbo$ rate. But the combination o5 sub-carriers carryin1 in5ormation in para$$e$ a$$ows 5or hi1h data rates. The other ad&anta1e o5 a $ow symbo$ rate is that inter-symbo$ inter5erence ;/%/< can be reduced dramatica$$y since the symbo$ time represents a &ery sma$$ proportion o5 the typica$ mu$tipath de$ay. The transmitter sta1e o5 an K>?M transcei&er ta(es data 5rom an /' networ() con&erts) and encodes it into a seria$ stream be5ore modu$ation. The K>?M si1na$ is 1enerated usin1 an /n&erse >ast >ourier Trans5orm ;/>>T< into an /> ana$o1 si1na$

&onfidential

'

4G Technology and Specifications


which is then sent to the !> transcei&er. The recei&er sta1e o5 the transcei&er simp$y re&erses the process. K>?M pro&ides a particu$ar$y robust air inter5ace that is resistant to the e55ects o5 mu$ti-path de$ays whi$e maintainin1 spectra$ e55iciency. Iowe&er) desi1ners o5 K>?M and other M#M-based systems ha&e been 5orced to dea$ with a host o5 cha$$en1es.

1igher layer issues in 4G


*G is pac(et-based networ(. %ince it wou$d carry &oice as we$$ as internet tra55ic it shou$d be ab$e to pro&ide di55erent $e&e$ o5 Qo%. Networ( $e&e$ issues inc$ude Mobi$ity Mana1ement) #on1estion contro$) and Qo%.

#o!ility #anagement
Mobi$ity Mana1ement inc$udes $ocation re1istration) pa1in1 and hando&er. The MT shou$d be ab$e to access the ser&ices at any p$ace possib$e. The 1$oba$ roamin1 can be achie&ed by with the he$p o5 mu$ti-hop networ(s that can inc$ude the H" Ns or the sate$$ite co&era1e in remote areas. seam$ess ser&ice ;EC0 so5t hando&er o5 the MT 5rom one networ( to another or 5rom one (ind o5 ser&ice to other< is a$so important. The hand-o&er techni9ues shou$d be desi1ned so that they ma(e e55icient use o5 the networ( ;routin1<. New techni9ues in $ocation mana1ement mi1ht be imp$emented. Each MT need not do $ocation re1istration e&ery time. They can instead do concatenated $ocation re1istration) which reports to the networ( that they are concatenated to a common ob+ect. EC- MTs in a train need to re-re1ister on$y when they 1et o55 the train and ti$$ the networ( (nows that they are in the train.

&ongestion &ontrol
#on1estion contro$ wi$$ be another critica$ issue in the hi1h per5ormance *G networ(s. Two basic approaches can be ta(en towards the con1estion contro$0 .. &oidance or pre&ention o5 the con1estion The a&oidance scheme wi$$ re9uire the networ( to suitab$y imp$ement the admission contro$ ;measurement based or pre-computed mode$< and schedu$in1 techni9ues. 2. ?etection and reco&ery a5ter con1estion. The detection and reco&ery wou$d re9uire 5$ow contro$ and 5eedbac( tra55ic mana1ement. conser&ati&e approach mi1ht be proposed 5or the *G systems because o5 the wide &ariety o5 Qo% re9uirements.

8uality of Ser$ice 98oS:


*G systems are to pro&ide rea$-time and internet-$i(e ser&ices. The rea$-time ser&ices can be c$assi5ied into two (inds0 .. Guaranteed0 pre-computed de$ay bound is re9uired 5or the ser&ice. EC &oice 2. Better-than-best e55ort0 'redicti&e0 %er&ice needs upper bound on end-to-end de$ay. #ontro$$ed de$ay0 ser&ice mi1ht a$$ow dynamica$$y &ariab$e de$ay. #ontro$$ed $oad0 %er&ice needs resources ;bandwidth and pac(et processin1<.

&onfidential

'%

4G Technology and Specifications


.)6;T";.)6 8"S S2--"/T
Three distinct situations arise in the Qo% architecture0 i< !e1istration) when a user may on$y use networ( resources a5ter authentication and authori:ation) ii< %er&ice authorisation) when the user has to be authori:ed to use speci5ic ser&icesG and iii< Iando&er , when there is a need to re-a$$ocate resources 5rom one ! to another.

i. /egistration and Ser$ice ,uthorisation

Support for ;oS - registration and service authorisation


The !e1istration process is initiated a5ter a #are o5 ddress ;#o < is ac9uired by the MT &ia state$ess auto-con5i1uration) a&oidin1 ?up$icate ddress ?etection ;? ?< by usin1 uni9ue $ayer-2 identi5iers to create the /nter5ace /denti5ier part o5 the /'&6 address. Iowe&er) 1ettin1 a #o does not entit$e the user to use resources) besides re1istration messa1es and emer1ency ca$$s. The MT has to start the authentication process by eCchan1in1 the authentication in5ormation with the ; #< uthentication) uthorisation) ccountin1 and #har1in1 throu1h the !. =pon a success5u$ authentication) the # %ystem wi$$ push the NJ=' ;networ( &iew o5 the =ser 'ro5i$e< to both the Qo% Bro(er and the MT) &ia the !. Messa1es . to * as shown in 5i1. The same picture shows how each networ( ser&ice is authori:ed ;messa1es 5 to @<. The pac(ets sent 5rom the MT with a speci5ic ?%#' imp$icit si1na$ the re9uest o5 a particu$ar ser&ice) such as a &oice ca$$. /5 the re9uested ser&ice does not match any po$icy a$ready set in the ! ;that is) the user has not estab$ished a &oice ca$$ be5ore) e.1.<) the Qo% attendantDmana1er at the ! interacts with the Qo% Bro(er that ana$yses the re9uest and authorises the ser&ice or not) based on the =ser NJ=' ;Networ( Jiew o5 the =ser 'ro5i$e< and on the a&ai$abi$ity o5 resources. This authorisation corresponds to a con5i1uration o5 the ! ;&ia #K'% Q.-R< with the appropriate po$icy 5or that user and that ser&ice ;e.1. a$$owin1 the pac(ets mar(ed as 7be$on1in1O to &oice ca$$ to 1o throu1h) and con5i1urin1 the proper schedu$er parameters<. 5ter that) pac(ets with authorised pro5i$e wi$$ be $et into the networ( and non-con5ormant pac(ets wi$$ restart the authori:ation process once more) or wi$$ be discarded.

&onfidential

2(

4G Technology and Specifications iii. 1ando$er *ith 8oS guarantees

.nd-to-.nd ;oS Support - %andover with ;oS


Kne o5 the di55icu$t prob$ems o5 /' mobi$ity is assurin1 a constant $e&e$ o5 Qo%. =ser mobi$ity is assured in our networ( by means o5 5ast hando&er techni9ues in con+unction with conteCt trans5er between networ( e$ements ; !s - o$d and new , and Qo% Bro(ers<. Hhen the 9ua$ity o5 the radio si1na$ in the MT to the current ! ;ca$$ed 7o$d !O) !.< drops) the termina$ wi$$ start a hando&er procedure to a nei1hbourin1 ! ;ca$$ed 7new !O) !2< with better si1na$ and 5rom which it has recei&ed a beacon si1na$ with the networ( pre5iC ad&ertisement. This hando&er has to be comp$eted without user perception) when ma(in1 a &oice ca$$) e.1.. >or achie&in1 this) the MT wi$$ bui$d its new care-o5-address and wi$$ start the hando&er ne1otiation throu1h the current !) whi$e sti$$ maintainin1 its current tra55ic. This ! wi$$ 5orward the hando&er re9uest to both the new ! and to the Qo% Bro(er. The two Qo% Bro(ers ;o$d and new< eCchan1e conteCt trans5er in5ormation re$ati&e to the user6s NJ=' and the set o5 ser&ices current$y in use by the MT. The new Qo% Bro(er wi$$ use this in5ormation to &eri5y the resources a&ai$abi$ity at the new ! and) in a positi&e case) con5i1ures the new ! to accept the hando&er. The MT is then in5ormed that the necessary resources are a&ai$ab$e at the new ! and may then per5orm the "ayer 2 hando&er. ?urin1 this $ast phase) both !s are bicastin1) to minimi:e pac(et $oss. The detai$ed messa1in1 5$ow is presented in the 5i1ure abo&e.

&onfidential

2'

4G Technology and Specifications 4enefits


.. Hire$ess radio resources wi$$ be sa&ed. 2. /n5rastructure cost wi$$ be reduced. 3. 'ower consumption wi$$ be $ess. *. Ii1h speed) hi1h capacity and $ow cost per bit.

Technology 3G <s 4G
ttribute Ma+or #haracteristic Networ( rchitecture >re9uency Band #omponent ?esi1n Bandwidth ?ata !ate ccess >orward Error #orrection %witchin1 3G 'redominant$y &oice- data as add-on Hide area #e$$ based ..6 - 2.5 GI: *G #on&er1ed data and Jo/' Iybrid , inte1ration o5 Hire$ess "an ;Hi>i<) B$ue Tooth) Hide rea 2 , @ GI:

Kptimi:ed antennaG mu$ti-band %mart antennasG %H mu$ti-bandG adapters wideband radios 5 , 2- MI: 3@5 Bbps - 2 Mbps H#?M D#?M 2--#on&o$ution code .D2) .D3G turbo #ircuitD'ac(et .--S MI: 2- , .-- Mbps M#-#?M or K>?M

#oncatenated #odin1 'ac(et

4obile top Speed '6 )perational

,!! kmAh 4ultiple versions B,!!/

,!! kmAh #ll '6 @'6v7.!= B,! !

&onfidential

22

4G Technology and Specifications &onclusion


Hi$$ *G ariseE #an it be imp$ementedE Hi$$ it sur&i&eE These are 5ew thou1hts that hit most o5 us) but $oo( at this paper comp$ete$y and the sma$$ conc$usion be$ow) and draw your own conc$usion. .. The wor( on *G systems has be1un in the industry as we$$ the academia. EC0 Hire$ess Hor$d !esearch >orum ;HH!>< has Ericson) $cate$) No(ia and %iemens G. The Nationa$ %cience >oundation ;N%>< has announced a pro1ram in .444 that ca$$s 5or proposa$s that wou$d $oo( at issues in&o$&ed in *G systems. /n the =% ) Motoro$a) "ucent) TFT) Norte$ and other ma+or companies are a$so wor(in1 on *G systems. 2. Mu$timedia tra55ic wi$$ be dominant in the 5uture. /t is estimated that &oice wou$d contribute to on$y 2--3- T o5 tota$ tra55ic in the 5uture. 3. d&ances in mobi$e communication techno$o1ies ha&e been rapid and their e55ects ha&e 5re9uent$y mani5ested themse$&es in ways and p$aces 5ar beyond the ones ima1ined by their in&entors. *. modi5ied /' wi$$ be the uni&ersa$ networ( $ayer protoco$ in the 5uture. 5.'o$icy-based mana1ement and in5ormation mode$ concepts) hierarchica$ Mobi$e /'&6 and ) 5$eCib$e pricin1 and bi$$in1 schemes) capabi$ity ne1otiations processes) and $ast but not $east) open) techno$o1y- independent '/s are a$$ important bui$din1 b$oc(s o5 *G mobi$e systems 6. ?i&erse array o5 app$ications $i(e &irtua$ na&i1ation) te$e-medicine) etc. 3. The entire networ( wou$d be di1ita$ and pac(et switched.

3.T 2S G/"W WIT1 T.&1)"3"G=

&onfidential

23

4G Technology and Specifications ,c+no*ledgements


/ wou$d $i(e to ac(now$ed1e team 5or their support and encoura1ement. %pecia$ Than(s to M% Hord) without which it wou$d ha&e been a di55icu$t one to comp$ete.

&onfidential

24

4G Technology and Specifications /eferences


.. Ians Einsied$er et a$.) 8The Moby ?ic( 'ro+ect0 Mobi$e Ietero1eneous $$-/' rchitecture8) T M% 2--.) Bra(ow) 'o$and) ;http0DDwww.ist-mobydic(.or1< 2. The /EEE 'ersona$ #ommunications Ma1a:ine) Kctober 2--. has a co$$ection o5 artic$es that $oo(s at the /' based issues in the *G wire$ess networ(s. ;http0DDieeeCp$ore.ieee.or1D$pdocsDepic-3D!ecent/ssues.htmEpunumberP4@< 3. 'hysica$ aspects o5 *G ;http0DDwww.commsdesi1n.comDstoryDKEG2--.-626%--65< *. Generic system architecture 5or *1 mobi$e communications ;http0DDc1i.di.uoa.1rDU1a:isDdataD2--3-&tc-sprin1.pd5< 5. Groups wor(in1 on *G0 HH!> ) pro+ects 5unded by N%> ) "ucent ) TFT) Motoro$a) etc. ; http0DDwww.wire$ess-wor$d-research.or1DEidP42<) ;http0DDwww.ns5.1o&DpubsD.444Dns5446@Dns5446@.htm< 6. Aerry py$arinos) %pirus "ou&ros) Geor1e sima(opou$ous) %ta&rous Bostopou$ous) 8?tat 9ueuin1 in G'!%D*G networ( 3. n /' Qo% architecture 5or *G networ(s ;http0DDwww.(t.a1h.edu.p$DUpacynaDcon5erenceVpapersD rt-Qo%Vsprin1er.pd5<

&onfidential

25

You might also like