Professional Documents
Culture Documents
WhitePaper 4GANDITSEVOLUTION
WhitePaper 4GANDITSEVOLUTION
White Paper
Mahesh G 4G Mobile Communications
&onfidential
CONTENTS
. ,. /. 4. 1. '$T()*+&T')$ 4G #$* 'TS -.#T+(.S 4G '$'T'#T'0. 4G #$* 'TS &%#"".$G.S 4G $.T2)(3 #(&%'T.&T+(.
T%. G.$.('& 4G 4)5'". $.T2)(3 #(&%'T.&T+(. '607 4G $.T2)(3 #(&%'T.&T+(. '$T.""'G.$T 4.*'#T')$ #(&%'T.&T+(. -)( 4G &()SS "#8.( &8"'$*.( #66()#&% 7. 5+S'$.SS 4)*." )- 4G $.T2)(3S 9. 4G $.T2)(3 S6.&'-'&#T')$S 6%8S'&#" #$* 4#& "#8.( &%#$."" #&&.SS .(()( &)$T()" &)*'$G )-*4 4)5'"'T8 4#$#G.4.$T &)$G.ST')$ &)$T()" ;+#"'T8 )- S.(0'&.
&onfidential
/G or Third Generation
3G systems promise 5aster communications ser&ices) entai$in1 &oice) 5acsimi$e and /nternet data trans5er capabi$ities. The aim o5 3G is to pro&ide these ser&ices anytime) anywhere throu1hout the 1$obe) with seam$ess roamin1 between standards. /T=6s /MT-2--- is a 1$oba$ standard 5or 3G and has opened new doors to enab$in1 inno&ati&e ser&ices and app$ication 5or instance) mu$timedia entertainment) and $ocation-based ser&ices) as we$$ as a who$e $ot more. /n 2--.) Aapan saw the 5irst 3G networ( $aunched.3G techno$o1y supports around .** Bbps) with hi1h speed mo&ement) i.e. in a &ehic$e. 3@* Bbps $oca$$y) and up to 2Mbps 5or 5iCed stations) i.e. in a bui$din1.
4G or -orth Generation
>or . and 2G standards) bandwidth maCimum is 4.6 BbitDsec) this is approCimate$y 6 times s$ower than an /%?N ;/nte1rated ser&ices di1ita$ networ(<. !ates did increase by a 5actor o5 3 with newer handsets to 2@.@(bps. This is rare$y the speed thou1h) as in crowded areas) when the networ( is busy) rates do drop dramatica$$y. Third 1eneration mobi$e) data rates are 3@* (bps ;down$oad< maCimum) typica$$y around 2--(bps) and 6*(bps up$oad. These are comparab$e to home broadband connections.
&onfidential
>ourth 1eneration mobi$e communications wi$$ ha&e hi1her data transmission rates than 3G. *G mobi$e data transmission rates are p$anned to be up to .-- me1abits per second on the mo&e and .---1i1bits per second stationary) this is a phenomena$ amount o5 bandwidth) on$y comparab$e to the bandwidth wor(stations 1et connected direct$y to a " N. To understand *G) we need to (now about 3G. %o how did 3G startE The idea didn6t come 5rom networ( operators) but 5rom de&ice manu5actures. /n .446 Nippon Te$ephone F Te$e1raph ;NTT< and Ericsson started de&e$opment o5 3GG then in .443 in the =% the T/ ;Te$ecommunications /ndustry ssociation< chose #?M ;#ode ?i&ision Mu$tip$e ccess< as a techno$o1y 5or 3GG and then in .44@ the ET%/ ;European te$ecommunications %tandards /nstitute< a$so chose #?M G in the end) in .44@ wideband #?M or H-#?M and cdma2--- were decided 5or the =ni&ersa$ Mobi$e Te$ecommunications %ystem ;=MT%<. The two ma+or radio standards used 5or 3G are H-#?M ;wideband code di&ision mu$tip$e access<) and #?M 2---. H-#?M is used in Europe) where #?M 2--- is used in the =% . /n #?M ) one si1na$ carries the data) this is then mu$tip$ied with a si1na$ with a 5aster rate) that his more bandwidth) it uses T?M ;Time ?i&ision Mu$tip$eCin1<. #?M 2-- uses #?M ;common code di&ision mu$tip$eCin1<. Now we need to discuss the di55erent access techno$o1ies) these are >?M ) T?M and #?M . The most common ana$o1 system is >?M ) or) >re9uency ?i&ision Mu$tip$e ccess. /t is a method where the spectrum is cut up into di55erent 5re9uencies and then this chun( 1i&en to the users. t one time on$y one user is assi1ned to a 5re9uency. Because o5 this the 5re9uency is c$osed) unti$ the ca$$ is ended) or it is passed on to another 5re9uency. >or a proper ca$$ to ta(e p$ace) two 5re9uencies are needed) one 5or sendin1 and one 5or recei&in1) >?M has been used 5or 5irst 1eneration ana$o1 systems on$y) this is due to the $ar1e bandwidth wasta1e hi1h$i1hted abo&e. T?M or Time ?i&ision Mu$tip$e ccess ma(es use o5 the who$e a&ai$ab$e spectrum) un$i(e >?M . /nstead o5 sp$ittin1 the s$ots by 5re9uency) it sp$its them by time) o&er a$$ o5 the 5re9uency. Each subscriber is 1i&en a time s$ot) as opposed to a 5re9uency. There5ore many uses can sit on one 5re9uency) and ha&e di55erent time s$ots) because the time s$ots are switched so rapid$y) it seems $i(e the channe$ is permanent$y connected. T?M is used 5or 2G networ(s. #?M or #ode ?i&ision Mu$tip$e ccess uses the spread spectrum method) the way it wor(s means it6s hi1h$y encrypted) so it6s no surprise it was de&e$oped and used by the mi$itary. =n$i(e >?M ) #?M a$$ows the user to sit on a$$ o5 the a&ai$ab$e 5re9uencies at the same time) and hop between then. Each ca$$ is identi5ied by its uni9ue code) hence the term #ode ?i&ision. #?M is &ery bandwidth e55icient. /t a$so a$$ows 5or so5t hand o55) meanin1 it can communicate with more than one base station at any one time) &ery handy isn6t itE No wonder it was chosen 5or 3G.
&onfidential
)nto 4G...
thin1s to di55erent peop$e0 5or some it is mere$y a hi1her-capacity ;e.1.) .-- MbDs< new radio inter5ace) whi$e 5or others it is an interwor(in1 o5 ce$$u$ar and wire$ess " N techno$o1ies that emp$oys a &ariant o5 the Mobi$e /'&6 mobi$ity mana1ement protoco$ ;e.1.) Iierarchica$ Mobi$e /'&6< 5or inter-system hando55 and /ET> techno$o1ies 5or seam$ess roamin1. This now wide$y accepted &ision s(etches a hetero1eneous networ( in5rastructure comprisin1 di55erent wire$ess access systems ;e.1.) G%MDG'!%) =MT%) ?JB-T) I '%) H" N< in a comp$ementary manner) where the user) supported by hisDher persona$ inte$$i1ent a1ent;s<) en+oys untethered connecti&ity and ubi9uitous access to app$ications o&er the most e55icient combination o5 a&ai$ab$e systems.
&onfidential
&onfidential
.2. Mobi$ity o5 users across mu$tip$e termina$s. .3. Mobi$ity o5 termina$s across mu$tip$e techno$o1ies. .*. #on5identia$ity both o5 user tra55ic and o5 the networ( contro$ in5ormation.
&onfidential
. The
&onfidential
&onfidential
'(
4G Technology and Specifications 4G )et*or+ ,rchitecture The generic 4G mo!ile net*or+ architecture
The architecture consists o5 common core Networ() which in turn is connected to di55erent other wired and wire$ess networ(s. /t6s connected to '%TN ;public switched telephone network< /%?N ;'ntegrated Services *igital $etwork< throu1h GG%N ;Gateway G6(S Support $ode=. GGS$ is a main
component of the G6(S network. The GGS$ is responsible for the interworking between the G6(S network and external packet switched networks, like the 'nternet and >.,1 networks.
/t6s connected to 2G throu1h %G%N to BT% &ia B%# ;Business systems connection<. %G%N ;Serving G6(S Support $ode= is responsible for the delivery of data packets from and to the mobile stations within its geographical service area.BT% ;base transreceiver
station= is a piece of e?uipment that facilitates wireless communication between user e?uipment @+.= and a network.
/t6s connected to 31 throu1h %G%N to Node B &ia !N#. The !adio ccess Networ( consists o5 new networ( e$ements) (nown as Node B and !adio Networ( #ontro$$ers ;!N#s<. Node B is comparab$e to the Base Transcei&er %tation in 2G wire$ess networ(s. !N# rep$aces the Base %tation #ontro$$er) and a$so connected to di55erent networ(s $i(e H" N access networ(s) d-hocD' N Mobi$e Networ(s and protoco$s $i(e %/';The Session 'nitiation 6rotocol= is a signaling
protocol, widely used for setting up and tearing down multimedia communication sessions such as voice and video calls over the 'nternet.
&onfidential
''
>i1ure i$$ustrates some o5 the hando&er possibi$ities in such networ( with a mo&in1 user. >our administrati&e domains are shown in the 5i1ure with di55erent types o5 access techno$o1ies. Each administrati&e domain is mana1ed by an # system. t $east one networ( access contro$ entity) the Qo% Bro(er) is re9uired per domain. ?ue to the re9uirements o5 5u$$ ser&ice contro$ by the pro&ider) a$$ the hando&ers are eCp$icit$y hand$ed by the mana1ement in5rastructure throu1h /'-based protoco$s) e&en when they are intratechno$o1y) such as between two di55erent ccess 'oints in @-2...) or between two di55erent !adio Networ( #ontro$$ers in H#?M . $$ networ( resources are mana1ed by the networ( pro&ider) whi$e the user on$y contro$s its $oca$ networ() termina$) and app$ications. %ummari:in1 >i1ure) the (ey entities are0 user - a person or company with a ser&ice $e&e$ a1reement ;%" < contracted with an operator 5or a speci5ic set o5 ser&ices. N MT ;Mobi$e Termina$< - a termina$ 5rom where the user accesses ser&ices. Kur networ( concept supports termina$ portabi$ity) which means that a termina$ may be shared amon1 se&era$ users) a$thou1h not at the same time. N ! ; ccess !outer< - the point o5 attachment to the networ() which ta(es the name o5 !G ;!adio Gateway< - 5or wire$ess access ;H#?M or @-2...<. N ' ;'a1in1 1ent< - entity responsib$e 5or $ocatin1 the MT when it is in 8id$e mode8 whi$e there are pac(ets to be de$i&ered to it.
&onfidential
'2
/n the abo&e dia1ram) Networ( a1ent ad&ertises their bearer ser&ice o55erin1s to the user6s mediation a1ent. He consider bearer ser&ice o55erin1s to be a combination o5 Qo% $e&e$ and pricin1 mode$ supported and app$ied) respecti&e$y) by the wire$ess networ( represented by the networ( a1ent. 'ro&isionin1 o5 wire$ess networ( bearer ser&ices under a who$esa$e mode$ o5 peerin1 a1reements to ad+acent networ( domains. %er&ice a1ents re5er to app$ication 5unctiona$ity that may interact with mobi$e termina$ a1ents and networ( a1ents 5or the purpose o5 Qo% mana1ement and Qo% adaptation. ser&ice a1ent wi$$ in5orm the mobi$e termina$ a1ent and the networ( a1ents o5 the Qo% !e9uirements o5 their tra55ic 5$ows and re1ister an appropriate ca$$bac( inter5ace to support subse9uent noti5ications and Qo% adaptation 5or these tra55ic 5$ows. Mobi$e networ( a1ents must abide by a common networ( in5ormation mode$ so that an unambi1uous de5inition o5 networ( bearer ser&ices is possib$e) e.1.) when ne1otiatin1 with other a1ents. !ea$i:in1 that each a1ent represents the interests o5 a particu$ar sta(eho$der in the mobi$e ser&ice pro&ision ;i.e.) mobi$e networ( operator) app$ication pro&ider) mobi$e user<) we assume that it operates under an indi&idua$ po$icy. Notab$y) the resu$tin1 dynamics are that o5 an open mar(et where di55erent 1oods are ad&ertised at wide$y (nown prices and se$5ish consumers may 5ree$y choose 5rom a wide ran1e o5 producers.
&onfidential
'3
Hith the he$p o5 cross $ayer cy$inder approach we can 1ain (now$ed1e about optimi:ation o5 iteration between communication $ayers .The importance o5 $ayered approach has made it a desi1n princip$e rather than a common desi1n pattern. This $eads the *G architecture to ha&e a architecture o5 its own (ind. #ross $ayer a$$ows sharin1 in5ormation amon1 the &arious $ayers and optimi:ation can be done at e&ery $ayer separate$y.
&onfidential
'4
&onfidential
'5
Service Aggregator
The ro$e o5 ser&ice a11re1ator ;% < is two5o$d. Kn the one hand the % acts as an intermediary between a end userDsubscriber and mu$tip$e ser&ices ;the ser&ice o55erin1 o5 the % <. Kn the other hand) 5or %er&ice 'ro&ider the % acts as an intermediary to mu$tip$e di55erent networ( inte1rators) such that ser&ices do not need to be concerned with issues e$iminatin1 the need 5or $i(e determinin1 on which networ( a subscriber is current$y $ocated acti&e. /n this mode$) end users eCp$icit$y subscribe to the % . The % mana1es these subscriptions and a$so ta(es care o5 bi$$in1G based on accountin1 in5ormation recei&ed 5rom ser&ices) networ( inte1rators) and the % itse$5. /n this way the % not on$y pro&ides sin1$e si1n-on) but a more 1enera$ sin1$e point o5 contact.
)et*or+ Integration
The networ( inte1ration ;N/< enab$es end users to seam$ess$y roam across hetero1eneous networ(s and their administrati&e domains. To support the seamlessness aspect is essentia$ 5or this 5unctiona$ity. The N/ pro&ides the basic networ( mana1ement 5unctiona$ity and pro&ides an abstraction o5 the under$yin1 networ(s. This pro&ides the i$$usion o5 one &irtua$ networ( towards upper ser&ice $ayers and ser&ices) and a$so such as networ( inte1ration speci5ic aspects to endusers. >or eCamp$e) it pro&ides transparent and inte1rated authentication such that end users are not re9uired to re-$o1in e&ery time the access networ( chan1es. >or ser&ices) N/ ta(es care o5 connecti&ity , bein1 ab$e to reach the end user termina$. This in&o$&es networ( addressin1 issues and techno$o1ies such as Mobi$e /'.
&onfidential
'6
%imi$ar to sin1$e carrier #?M systems) the users are mu$tip$eCed with ortho1ona$ codes to distin1uish users in M#-#?M . Iowe&er) in M#-#?M ) each user can be a$$ocated se&era$ codes) where the data is spread in time or 5re9uency. Either way) mu$tip$e users access the system simu$taneous$y. /n K>?M with T?M ) the users are a$$ocated time inter&a$s to transmit and recei&e data. ?i55erences between K>?M with T?M and M#-#?M can a$so be seen in the types o5 modu$ation used in each subcarrier. Typica$$y) M#-#?M uses 9uadrature phase-shi5t (eyin1 ;Q'%B<) whi$e K>?M with T?M cou$d use more hi1h-$e&e$ modu$ations ;I"M<) such as) mu$ti$e&e$ 9uadrature amp$itude modu$ation ;M-Q M< ;where M P * to 256<. Iow-e&er) to optimi:e o&era$$ system per5ormance) adapti&e modu$ation can be usedG where the $e&e$ o5 Q M 5or a$$ subcarriers is chosen based on measured parameters.
&hannel ,ccess
The a$$ocation o5 the spreadin1 codes or the time s$ots can be done in such a way that the throu1hput is maCimi:ed. >or eCamp$e) a$$ the resources can be a$$ocated to a user whose channe$ is &ery c$ean and users who ha&e &ery noisy channe$s can be a$$ocated $itt$e amount o5 bandwidth ti$$ their channe$ becomes better. Iowe&er) the a$$ocation shou$d maintain certain amount o5 5airness whi$e distributin1 the resources.
&onfidential
'7
Each o5 the sub-carriers has a $ow symbo$ rate. But the combination o5 sub-carriers carryin1 in5ormation in para$$e$ a$$ows 5or hi1h data rates. The other ad&anta1e o5 a $ow symbo$ rate is that inter-symbo$ inter5erence ;/%/< can be reduced dramatica$$y since the symbo$ time represents a &ery sma$$ proportion o5 the typica$ mu$tipath de$ay. The transmitter sta1e o5 an K>?M transcei&er ta(es data 5rom an /' networ() con&erts) and encodes it into a seria$ stream be5ore modu$ation. The K>?M si1na$ is 1enerated usin1 an /n&erse >ast >ourier Trans5orm ;/>>T< into an /> ana$o1 si1na$
&onfidential
'
#o!ility #anagement
Mobi$ity Mana1ement inc$udes $ocation re1istration) pa1in1 and hando&er. The MT shou$d be ab$e to access the ser&ices at any p$ace possib$e. The 1$oba$ roamin1 can be achie&ed by with the he$p o5 mu$ti-hop networ(s that can inc$ude the H" Ns or the sate$$ite co&era1e in remote areas. seam$ess ser&ice ;EC0 so5t hando&er o5 the MT 5rom one networ( to another or 5rom one (ind o5 ser&ice to other< is a$so important. The hand-o&er techni9ues shou$d be desi1ned so that they ma(e e55icient use o5 the networ( ;routin1<. New techni9ues in $ocation mana1ement mi1ht be imp$emented. Each MT need not do $ocation re1istration e&ery time. They can instead do concatenated $ocation re1istration) which reports to the networ( that they are concatenated to a common ob+ect. EC- MTs in a train need to re-re1ister on$y when they 1et o55 the train and ti$$ the networ( (nows that they are in the train.
&ongestion &ontrol
#on1estion contro$ wi$$ be another critica$ issue in the hi1h per5ormance *G networ(s. Two basic approaches can be ta(en towards the con1estion contro$0 .. &oidance or pre&ention o5 the con1estion The a&oidance scheme wi$$ re9uire the networ( to suitab$y imp$ement the admission contro$ ;measurement based or pre-computed mode$< and schedu$in1 techni9ues. 2. ?etection and reco&ery a5ter con1estion. The detection and reco&ery wou$d re9uire 5$ow contro$ and 5eedbac( tra55ic mana1ement. conser&ati&e approach mi1ht be proposed 5or the *G systems because o5 the wide &ariety o5 Qo% re9uirements.
&onfidential
'%
&onfidential
2(
&onfidential
2'
Technology 3G <s 4G
ttribute Ma+or #haracteristic Networ( rchitecture >re9uency Band #omponent ?esi1n Bandwidth ?ata !ate ccess >orward Error #orrection %witchin1 3G 'redominant$y &oice- data as add-on Hide area #e$$ based ..6 - 2.5 GI: *G #on&er1ed data and Jo/' Iybrid , inte1ration o5 Hire$ess "an ;Hi>i<) B$ue Tooth) Hide rea 2 , @ GI:
Kptimi:ed antennaG mu$ti-band %mart antennasG %H mu$ti-bandG adapters wideband radios 5 , 2- MI: 3@5 Bbps - 2 Mbps H#?M D#?M 2--#on&o$ution code .D2) .D3G turbo #ircuitD'ac(et .--S MI: 2- , .-- Mbps M#-#?M or K>?M
&onfidential
22
&onfidential
23
&onfidential
24
&onfidential
25