MDSF Unit 1
Mobile Communication
Mobile communication refers to the exchange of information between devices, typically using
wireless technology, without the need for physical connections. It primarily involves mobile
phones, but also includes other portable devices like tablets, smartwatches, and laptops. The
communication can occur through cellular networks (like 4G, 5G), Wi-Fi, Bluetooth, or satellite
systems.
At its core, mobile communication enables voice calls, text messages, and data transfer such as
internet browsing, social media use, video calls, and more. The advancement of mobile
communication technologies has significantly impacted everyday life, offering greater mobility,
convenience, and access to real-time communication on a global scale.
Mobile communication
Mobile communication refers to the transmission of data or voice through wireless systems between
mobile devices (like smartphones, tablets, etc.) and networks. It allows users to connect without needing
physical cables, offering high mobility. Over the years, mobile communication has evolved significantly.
Here's a breakdown of its details:
1. Types of Mobile Communication
• Cellular Communication: This is the most common form, where mobile phones communicate with cell
towers through radio waves. It's divided into generations, like 2G, 3G, 4G, and now 5G.
• Wi-Fi: A wireless local area network technology, used to connect devices to the internet over short
distances.
• Bluetooth: Short-range wireless communication, typically used for connecting peripherals (headphones,
speakers, etc.).
• Satellite Communication: Used in remote areas where other network infrastructure isn't available.
Mobile satellites provide global communication coverage.
Mobile Communication
2. Generations of Mobile Networks
•1G: Introduced analog voice services (calls only).
•2G: Brought digital signals, enabling SMS (text messaging) and voice calls.
•3G: Enabled faster data transfer, allowing mobile internet browsing, video calling, and faster file
downloads.
•4G: Revolutionized mobile internet with even faster speeds, HD video streaming, gaming, and
seamless connectivity.
•5G: The latest technology, offering ultra-fast speeds, low latency, and the ability to connect
billions of devices, supporting IoT (Internet of Things).
Mobile Communication
3. Key Technologies in Mobile Communication
•Radio Frequency (RF): Used for transmitting voice and data over the air.
•Modulation: A process where digital data is converted into a signal that can be transmitted over
RF waves.
•MIMO (Multiple Input Multiple Output): Allows for the use of multiple antennas at both ends
(transmitter and receiver) to improve data speed and signal quality.
•LTE (Long-Term Evolution): A technology used in 4G networks, significantly improving download
speeds and network capacity.
•VoLTE (Voice over LTE): A technology that allows voice calls to be transmitted over 4G networks
instead of older technologies.
Mobile Communication
4. Mobile Communication Services
• Voice Calls: The basic function of mobile communication.
• Text Messaging (SMS): Short Message Service allows users to send and receive text-based messages.
• Mobile Internet: Data services that allow browsing, social media, streaming, etc.
• MMS: Multimedia Messaging Service, which allows sending pictures, video, and audio.
• Video Calling: Making calls via mobile networks or Wi-Fi, with real-time video.
5. Applications of Mobile Communication
• Social Media: Platforms like Facebook, Instagram, Twitter, and WhatsApp allow users to stay connected globally.
• E-commerce: People shop online using mobile apps or websites.
• Mobile Banking: Online banking and payment services (like PayPal, Apple Pay, etc.) are accessible via mobile devices.
• Telemedicine: Health consultations via mobile apps and video calls.
• Mobile Gaming: Access to games, multiplayer, and online gaming platforms directly on the mobile device.
Mobile Communication
6. Challenges and Issues
• Network Congestion: In densely populated areas, the network may become overcrowded, affecting
communication quality.
• Battery Life: Constant communication and data transfer can drain mobile device batteries quickly.
• Security & Privacy: Risks like data breaches, hacking, and unauthorized access to personal information.
• Radiation Concerns: Debate over the potential health risks of prolonged exposure to radiofrequency radiation
from mobile devices.
7. Future of Mobile Communication
• 6G Networks: Still in the early stages of research, but anticipated to provide even faster speeds, global
coverage, and integration of AI.
• Internet of Things (IoT): The future of mobile communication will see more devices interconnected through
mobile networks, including smart cities, autonomous vehicles, and health monitoring devices.
Cellular Coverage Maps
Cellular coverage maps are graphical representations showing the geographic areas where a mobile
network (like those of Verizon, AT&T, or Vodafone) offers service. These maps help users understand the
strength and availability of the signal in different locations. The coverage is typically depicted with
different colors or shading to indicate signal strength or the type of network available (2G, 3G, 4G, 5G).
Key Aspects of Cellular Coverage Maps:
•Signal Strength: Often shown as a gradient (e.g., red for strong signals, yellow for weak signals),
representing how well a device can connect to the network in specific areas.
•Network Type: Coverage maps may indicate which network technology (e.g., 2G, 3G, 4G LTE, 5G) is
available in a given area.
•Geographical Area: These maps cover urban, suburban, rural, and remote areas. They can help users
plan where they’ll likely get the best service or identify areas where coverage might be sparse or
absent.
Factors Affecting Cellular
Coverage:
•Topography: Mountains, valleys, and other natural barriers can block signals, reducing coverage.
•Infrastructure: The density of cell towers and antennas in an area influences signal strength.
•Obstructions: Buildings, large structures, and even trees can interfere with signals, leading to
weaker reception.
•Network Load: The number of users accessing the network in a particular area can affect speed
and quality of service.
Handoff (or Handover)
Handoff (or handover) refers to the process where a mobile device switches from one cell tower or
base station to another as it moves. This process is crucial for maintaining uninterrupted
communication, especially during calls or data sessions, as users travel or change locations.
There are two main types of handoff:
1.Hard Handoff:
1. In a hard handoff, the device loses its connection to the first cell tower before connecting to the next
one. This type of handoff is usually seen in older 2G or 3G networks.
2. It might result in a brief drop in the connection, such as a small gap in a voice call or data session.
2.Soft Handoff:
1. Soft handoff happens in 3G, 4G, and 5G networks. In this case, the device is connected to both the old
and new cell towers simultaneously during the transition.
2. This process ensures a more seamless handoff with no interruptions in service, which is particularly
important for real-time communications like voice calls.
Types of Handoffs
• Intra-cell Handoff: When the device moves from one sector or antenna of the same cell tower to another sector of the same
tower.
• Inter-cell Handoff: When the device switches between two different cell towers (either within the same network or across
different networks).
• Inter-system Handoff: This occurs when the device switches between two different types of networks (e.g., moving from a
4G to a 5G network).
Key Considerations for Handoff:
• Seamlessness: The handoff should occur without interrupting the user’s connection (especially for real-time applications like
calls or video).
• Timing: The process must be quick to ensure minimal delay.
• Signal Strength: The decision to initiate a handoff is often based on signal strength, network congestion, and the device's
movement.
• Load Balancing: In some cases, handoff is used for network optimization, such as offloading traffic to a less congested tower.
Handoff Challenges:
•Quality of Service: A poor or poorly executed handoff can lead to dropped calls, slower data
speeds, or interruptions in service.
•Network Overload: When a tower or network is overloaded, it can cause delays in the handoff
process.
•Mobility: For high-speed moving devices (like cars or trains), ensuring smooth handoff between
towers becomes more complex, especially in areas with less coverage.
Evolution of Mobile Networks
GSM
CDMA
3G
4G
5G
GSM: Global System for Mobile
Communication
GSM is a digital cellular communication standard that is universally accepted.
The European Telecommunications Standards Institute created the GSM
standard to define the procedures for second-generation digital mobile
networks that are used by devices such as mobile phones. It is a wide-area
communications technology program that utilizes digital radio channeling to
bring forth audio, information, and multimedia communication systems.
GSM
Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) are the two
critical approaches used by GSM:
• FDMA is the technique of subdividing frequency bands into many bands, each of which is
allocated to specific users. In GSM, FDMA separates the 25MHz bandwidth into 124 carrier
frequencies by 200 kHz. Every base station has one or more carrier frequencies assigned to it.
• Time Division Multiple Access (TDMA) is the practice of allocating the same frequency to multiple
users by separating the bandwidths into various time slots. Every subscriber is assigned a timeslot,
allowing different stations to split the same transmission area.
TDMA is used to divide each subdivided carrier frequency into different time slots for GSM. Each
Time-division multiple access frame does have 8-time slots and takes 4.164 milliseconds (ms). This
means that every time slot or physical channel in this structure should take 577 microseconds, and
information is transferred in bursts during that time. A GSM system has several cell sizes, including
macro, micro, Pico, and umbrella cells. Each cell differs depending on the execution domain.
A GSM network has five cell sizes: macro, micro, pico, and umbrella. Depending on the option
provided, the connectivity of each cell differs. The time division multiple access (TDMA) method
works by giving every client a varying time slot on a similar frequency. This can easily be adapted
to sending and receiving data and voice communication and it can hold bandwidths ranging from
64kbps to 120Mbps
The Architecture of GSM
The GSM architecture is made up of three central systems. The following are
the primary components of the GSM architecture:
•The network switching system (NSS)
•The mobile station (MS)
•The base station system (BSS)
•The operations and support system (OSS)
The Architecture of GSM
1. The network switching system (NSS)
NSS is a GSM element that provides flow management and call processing for mobile devices moving between base
stations. The switching system consists of the functional units listed below.
• Mobile Services Switching Center (MSC): Mobile Switching Center is integral to the GSM network architecture’s
central network space. The MSC supports call switching across cellular phones and other fixed or mobile network
users. It also monitors cellular services, including registration, location updates, and call forwarding to a roaming user.
• Home Location Register (HLR): It is a set of data items used for storing and managing subscriptions. It provides
data for each consumer as well as their last known position. The HLR is regarded as the most significant database
because it preserves enduring records about users. When a person purchases a membership from one of the
operators, they are enlisted in that operator’s HLR.
• Visitor Location Register (VLR): VLR is a database that provides subscriber information necessary for the MSC to
service passengers. This includes a short-term version of most of the data stored in the HLR. The visitor location
register can also be run as a standalone program, but it is usually implemented as a component of the MSC.
• Equipment Identity Register (EIR): It is the component that determines if one can use particular mobile
equipment on the system. This consists of a list of every functioning mobile device on the system, with each mobile
device recognized by its own International Mobile Equipment Identity (IMEI) number.
• Authentication Center (AuC): The AUC is a unit that offers verification and encryption factors to ensure the user’s
identity and the privacy of every call. The verification center is a secure file that contains the user’s private key in the
SIM card. The AUC shields network operators from various types of fraud prevalent in the modern-day cellular world.
The Architecture of GSM
2. The mobile station (MS)
The mobile station is a cell phone with a display, digital signal processor, and radio transceiver regulated by a SIM card that
functions on a system. Hardware and the SIM card are the two most essential elements of the MS. The MS (Mobile stations) is most
widely recognized by cell phones, which are components of a GSM mobile communications network that the operator monitors and
works.
Currently, their size has shrunk dramatically while their capabilities have skyrocketed. Additionally, the time between charges has
been significantly improved.
3. The base station system (BSS)
It serves as a connection between the network subsystem and the mobile station. It consists of two parts:
• The Base Transceiver Station (BTS): The BTS is responsible for radio connection protocols with the MS and contains the cell’s
radio transceivers. Companies may implement a significant number of BTSs in a big metropolitan area. Each network cell has
transceivers and antennas that make up the BTS. Based on the cell’s consumer density, every BTS includes anywhere from one to
sixteen transceivers.
• The Base Station Controller (BSC): The BSC is responsible for managing the radio resources of one or more BTS(s). This
manages radio channel configuration and handovers. The BSC serves as the link seen between mobile and MSC. It allocates and
emits MS frequency bands and time slots. Additionally, the BSC is responsible for intercell handover and transmits the BSS and MS
power within its jurisdiction.
The Architecture of GSM
4. The operations and support system (OSS)
The operation support system (OSS) is a part of the overall GSM network
design. This is linked to the NSS and BSC components. The OSS primarily
manages the GSM network and BSS traffic load. As the number of BS
increases due to customer population scaling, a few maintenance duties are
shifted to the base transceiver stations, lowering the system’s financial
responsibility. The essential purpose of OSS is to have a network synopsis and
assist various services and maintenance organizations with their routine
maintenance arrangements.
Applications of GSM
1. Sending and receiving short messages
The ability to send and receive text messages to and from mobile phones is known as the Short Message Service (SMS). SMS provides
services related to two-way paging, except with more features incorporated into the cell device or port. Text messaging allows a cell
phone user to receive a quick short message on their cell phone. Similarly, that user can compose a brief message to send to other
users.
SMS delivers short text messages of up to 140 octets over the GSM platform’s control system air interface. The Short Message Service
Center (SMSC) stores and transmits short messages from mobile users to their intended recipients. One may use it to send and receive
brief messages, saving time due to the rapid transmission of communications. Furthermore, there is no need to go online; the mobile
device has a signal, and it can send and receive short messages.
2. GSM and data security
Data security is the most crucial factor for usage operators. Specific aspects are now implemented in GSM to improve security. There is
currently an indication for ME and MS in this framework. The system proposes two subsystems. The appliance control subsystem allows
users to remotely control household appliances, while the security alert subsystem provides fully automated security monitoring.
This same system can instruct users via SMS from a particular phone number on how to change the condition of the home appliance
based on the person’s needs and preferences. The client is configured via SIM, allowing the system to observe Mobile subscribers on the
database. GSM also includes features for signal encryption.
The second element of GSM security is security alert, which would be accomplished in such a way that upon identification of an invasion,
the system would allow for the automatic creation of SMS, thereby notifying the user of a potential threat.
GSM technology will enable communication with anyone, wherever, at any moment. GSM’s functional architecture employs sophisticated
networking principles, and its idea offers the advancement of GSM as the first move towards an authentic personal communication
network with sufficient homogeneity to guarantee compatibility.
Applications of GSM
3. GSM for mobile system handover
The procedure of handover in any mobile system is critical. It is a necessary process, so handover could lead to call loss if done improperly. Undelivered calls could be
especially aggravating to subscribers, and as the percentage of undelivered calls grows, so does user dissatisfaction, so they’re more likely to switch to another network.
As a result, GSM handover was given special consideration when creating the standard. Whenever a cellular customer switches cells, the radio signal shifts from past to new.
Even though the GSM network is complicated, in contrast to other systems, the flexibility of the GSM procedure provides better performance to subscribers. In a GSM network,
there are four basic types of handoffs:
• Intra-cell handover: This type of handover is used to improve data traffic in the cell or to strengthen connection performance by modifying the carrier signal.
• Inter-cell handover: Additionally, it is known as intra-BSC handover. In this instance, the mobile changes cells while remaining in the BSC. Here, the BSC is in control of the
transfer procedure.
• Inter-BSC handover: It’s also known as an intra-MSC handover. Because BSC can only handle a restricted number of cells, we may have to move a phone from one BSC to
the other. Here, the handover is managed by the MSC.
• Inter-MSC handoff: This occurs when a mobile device moves from one MSC area to the next. MSC is spread over a wide area.
4. GSM in medical services
If the patient is severely injured or sick, but all they have access to is a phone, trying to connect with the closest hospital would be simple. If the patient is connected to the
doctor, they can receive initial care while on the way to the healthcare facility. In the event of a disease, doctors can review patient history and prepare for additional tests
while providing proper care.
Whenever a patient, attendant, or hospital member of staff becomes stranded on hospital grounds due to a power outage, GSM-fixed cellular terminals allow the individual to
connect very fast with the closest emergency responders. An individual in that circumstance can request help using the GSM SIM in the installed Fixed Cellular Terminal (FCT).
Telemedicine services are responsible for the entire situation. One could use the telemedicine system in any of the three ways listed below.
• Utilizing video conferencing, patients seated in one location can directly communicate with physicians, thus continuing the healing process.
• Leveraging health monitoring sensors that continuously update information about the patient’s health and guide hospitals and doctors to continue treatment.
• Conveying the obtained health records and transmitting obtained data for consultation and processing.
CDMA: Code Division Multiple
Access
CDMA stands for Code Division Multiple Access. It is basically a channel
access method and is also an example of multiple access. Multiple access
basically means that information by several transmitters can be sent
simultaneously onto a single communication channel. There are multiple users
which are provided or assigned variant CDMA codes and thus the users can
access the entire band of frequencies or the whole bandwidth. This method does
not limit the frequency range of the user. Hence, with the help of CDMA,
multiple users can share a band of frequencies without any kind of undue
interference between them. CDMA makes the use of spectrum technology along
with analog to digital conversion(ADC). It is thus used by various radio
communication technologies. Mainly, it is used for mobile communication.
Characteristics of CDMA
• It allows more users to connect at a given time and thus provides improved data and voice communication
capacity.
• A full spectrum is used by all the channels in CDMA.
• CDMA systems make the use of power control to eliminate the interference and noise and to thus improve the
network quality.
• CDMA encodes the user transmissions into distinct and unique codes in order to secure its signals.
• In CDMA systems all the cells can thus use the same frequency.
• CDMA systems have a soft capacity.Thus there is no particular limit to the number of users in a CDMA system but
with increase in the number of users the performance degrades.
Encoder for DS-SS CDMA
Encoder for DS-SS CDMA
• The input provided to the CDMA encoder can be in the form of Pulse code modulation (PCM) encoded voice band signal or can be a digital signal from
computer.
• It is multiplied with N bit, which is an unique chip code.
• The output of balanced modulator is the product code.
• In IF carrier it is used as an PSK modulation.
• The balanced modulator is sometimes referred to as multiplier.
• Further the modulated signal is then converted to RF band and is used for transmission purpose.
• The high power amplifier basically raises the level of power to a very high level and then the antennas transmit this signal.
• The encoder is also called as multiplexer.
Decoder for DS-SS CDMA
Decoder for DS-SS CDMA
• The decoder helps in reconverting the RF signal to IF.
• A coherent PSK carrier is been obtained from IF.
• The chip code is been used by the receiver and it helps in synchronizing the receiver station’s code generator.
• The recovered chip is then multiplied with recovered PSK carrier to generate PSK modulated signal which contains PSK carrier and the
chip code.
• The IF signal which is received, contains chip code, PSK carrier and data. In correlator it is compared with the received IF signal.
• The correlator helps in comparing this two signals and helps in recovering the original data.
• The decoder is also called as demultiplexer.
Advantages and Disadvantages
of CDMA
Advantages
Disadvantages
• Increased user capacity is an advantage of the CDMA as it
supports a lot more users in comparison to TDMA or FDMA. • CDMA lacks the facility of international roaming which
is provided by GSM.
• CDMA is more secure as the information transmitted is
below the noise floor making the intrusion of the spectrum • Since there is no limit to the number of users the
difficult.
system performance degrades with an increase in the
number of users.
• CDMA systems have comparatively fewer dropouts than
GSM. Thus, it can also be used in rural areas.
• Self-jamming problem occurs in CDMA systems
• The cost of the calls in CDMA is lower in comparison to the because of loss of orthogonality.
cost in GSM.
• The problem of channel pollution occurs in CDMA
• CDMA provides a high quality of voice with almost no noise systems which thus degrades the quality of audio.
during the calls.
• Since most of the mobile companies use GSM thus
• Using CDMA problems like multipath and fading do not there is a lack of handsets for CDMA technology.
occur.
• CDMA has a very low power requirement.
Comparison