Thesis Rajarshi Sanyal PDF
Thesis Rajarshi Sanyal PDF
Thesis Rajarshi Sanyal PDF
Smart Multiple Access Topologi Employing Intelligent Physical Layer for addressing
the Mobile Node
Sanyal, Rajarshi
Publication date:
2014
Document Version
Accepted author manuscript, peer reviewed version
General rights
Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners
and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights.
? Users may download and print one copy of any publication from the public portal for the purpose of private study or research.
? You may not further distribute the material or use it for any profit-making activity or commercial gain
? You may freely distribute the URL identifying the publication in the public portal ?
Take down policy
If you believe that this document breaches copyright please contact us at [email protected] providing details, and we will remove access to
the work immediately and investigate your claim.
DISSERTATION
SUBMITTED TO THE DEPARTMENT OF
ELECTRONIC SYSTEMS
OF
AALBORG UNIVERSITY
IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE DEGREE OF
DOCTOR OF PHILOSOPHY
Rajarshi Sanyal
Center for TeleInFrastruktur Denmark
i
Supervisors:
Prof. Ramjee Prasad, Aalborg University, Denmark
Prof. Ernestina Cianca, University of Rome, Italy
ISBN: 978-87-7152-088-0
Copyright © 2014 by
Rajarshi Sanyal
Center for TeleInFrastruktur (CTIF)
Aalborg University
Niels Jernes Vej 12
9220 Aalborg
Denmark
Email: [email protected]
All rights reserved by the author. No part of the material protected by this copyright notice may be
reproduced or utilized in any form or by any means, electronics or mechanical, including
photocopying, recording, or by any information storage and retrieval system, without written
permission from the author.
ii
Name of PhD student – Rajarshi Sanyal
Name and title of supervisor and any other supervisors – Ramjee Prasad, Professor, CTIF /
Ernestina Cianca, University of Rome
List of published papers:
1. Sanyal, R., Prasad, Enabling Cellular Device to Device Data Exchange on WISDOM 5G by
Actuating Cooperative Communication Based on SMNAT, International Journal of
Interdisciplinary Telecommunications and Networking. IGI Global publishers USA, Volume 6,
Issue 3,2014
2. Sanyal, R., Cianca, E. and Prasad, 'Novel WLL architecture based on Colour Pixel Multiple Access
implemented on a Terrestrial Video Network as the overlay', International Journal of
Interdisciplinary Telecommunications and Networking, IGI Global publishers USA Volume 5,
Issue 1,2013.
3. Sanyal, R., Cianca, E. and Prasad, 'Smart mobile networks with intelligent physical layer actuating
mobility management', Int. J. Mobile Network Design and Innovation, Inderscience, Switzerland
2012 Vol.4, No.2, pp.91 - 108
4. Sanyal, R., Cianca, E. and Prasad, R 'Nano mobile network based on Smart Location Management
and Addressing', Int. J. Mobile Network Design and Innovation, Inderscience, Switzerland, Vol. 4,
No. 3, 2012
5. Sanyal, R., Cianca, E. and Prasad, R, 'Challenges for Coexistence of Machine to Machine and
Human to Human Applications in Mobile Network: Concept of Smart Mobility Management,
International Journal of Distributed Sensor Networks, Hindawi publishers, USA/Egypt, Volume
2012 (2012), Article ID 830371, 12 pagesdoi:10.1155/2012/830371
6. Sanyal, R., Cianca, E. and Prasad, 'Closed User Group Automotive communication network based
on addressing at physical layer', International Journal of Interdisciplinary Telecommunications and
Networking. IGI Global publishers, USA, Volume 4, Issue 4. , 2012.
7. R. Sanyal, E. Cianca, and R. Prasad, "Beyond LTE: next generation multiple access technology
with intelligent lower layers," in Proceedings of ICWN 2011, the World Congress Computer
Science, Computer Engineering and Applied Computing and International Conference, Las Vegas,
USA,2011,p474
8. Rajarshi Sanyal , Ernestina Cianca, Ramjee Prasad " Rendering Intelligence at Physical Layer for
Smart Addressing and Multiple Access , IARIA conference on wireless networks 2011,Les
Menures, France, published at IEEE digital library.
9. Rajarshi Sanyal, 'Challenges in Interoperability and Roaming between LTE - Legacy core for
Mobility Management, Routing, Real Time Charging ' ITU WORLD 2011, Geneva, Switzerland,
26th October 2011, published in IEEE Explore.
10. Rajarshi Sanyal , Ernestina Cianca, Ramjee Prasad , Colour Pixel Multiple Access- A multiple
Access Technology for Next Generation Mobile Networks' , International Conference on Wireless
Networks (ICWN 09), 2009 World Congress Computer Science, Computer Engineering and
Applied Computing at Las Vegas, USA
11. Rajarshi Sanyal, Transmission of Audio signals from multiple sources riding on single lossless
streaming video channel using Phase Vocoder by applying Joint Source Channel Coding technique,
(CIC07): 2007 World Congress in Computer Science , Computer Engineering and Applied
Computing in Las Vegas USA
12. Rajarshi Sanyal,' Framework for Realizing mobile and computer communication through color
signals' ,SAM 2006, World Congress in Computer Science , Computer Engineering and Applied
Computing, Las Vegas,USA.
13. Rajarshi Sanyal, Mobile and Computer Communications Through Colour Signals - An Approach
Note. WINSYS 2006: 73-78.Portugal.
This thesis has been submitted for assessment in partial fulfillment of the PhD degree. The thesis is
based on the submitted or published scientific papers which are listed above. Parts of the papers are used
directly or indirectly in the extended summary of the thesis. As part of the assessment, co-author
statements have been made available to the assessment committee and are also available at the Faculty.
The thesis is not in its present form acceptable for open publication but only in limited and closed
circulation as copyright may not be ensured.
iii
Abstract
The factors that will drive the ontogenesis of next generation mobile networks are namely the
evolution of the mobile devices and ever incremental demand for data traffic triggered by the
proliferation of smart phones and the dongles. Apprehending an exponential growth in numbers of the
mobile users, the cell size of the mobile network will shrink. Eventually, there will be an upsurge of
signaling messages interchanged between the device and the network due to an increase in handover
related operations. Attempt should be made to reduce the interaction with the network and simplify
the mobility and location management related processes. We also consider in this dissertation the ever
increasing demand for data traffic caused by the new generation mobile devices; we set out a
technical architecture of a mobile network to abridge the intricate mobility and location management
processes as well as the addressing principle to render more operational efficiency and cater to the
needs of the data hungry applications that we envisage for the next generation devices and networks.
Our primary objective is to propose a technique of wireless communication where we render
intelligence to the physical layer to take part in some processes which is otherwise confined to higher
layer signalling activities, like, for example, addressing of a node. If we have a method to actuate user
identification for the purpose of mobility management by implementing lower layer processes, we can
simplify or eliminate the layer 7 processes and hence reduce the intricacy and costs of mobile network
elements and user equipment.
In the State-of-the-Art mobile network, the handset initiates a control message in a given periodicity
to update its location towards the Network. The Handover process requires exchange of substantial
control channel messages over the so called ‘signalling channels’. These network procedures guzzle
processing power in the handset/network, signalling resources and also drain out battery in the device.
The smart modulation scheme presented in this thesis abets the identification of the network users
right at the physical layer and relieves the application layer from the prosaic activities related to
addressing and mobility to a considerable extent. Noticeably, in all existing mobile network
topologies, modulation schemes are designed solely for conveying data symbols for all users in the
complex plane (user identification is not possible in layer 1). We propose to drift from this paradigm
and actuate user identification and mobility at physical layer. As a direct consequence, the incessant
signalling inter-exchange between the network and the devices reduces manifold, as the network does
not need to continuously track the mobile station within the coverage area. This perks up the handset
performance too.
Nano mobile devices designed for ‘Human to Human’ or ‘Machine to Machine’ applications have
inviolable constrains to operate in a mobile network, due to limited power resource and restrictions in
RF power output. With the State-of-the-Art mobile network, as it stands today, optimised operation of
a nano mobile device is untenable, because it desecrates considerable resources solely to maintain its
presence in the network. A mobile network based on smart location management and addressing
scheme provides an elegant solution to address these basic needs and helps in fostering this new breed
of mobile devices. The access network design is simplified with less resource hungry processes
associated to mobility management. This is aligned with our endeavour to make the mobile networks
cleaner, greener and leaner.
For a typical closed user group type of network, we propose a multiple access mechanism and
network topology which will eliminate the involvement of intelligent core network adjuncts in the
network area, and to use this intelligent physical layer to directly reach any node over the air interface
in the coverage area. Some typical implementations may be automotive communication systems,
corporate networks, campus networks, railway networks etc., which use closed numbering scheme
and coverage within the community network. This system is ‘presence agnostic’, hence the network is
iv
not aware of the exact location of the mobile node in the network area. Therefore, the mobility
management process is not envisaged. For a basic closed user network, the design does not follow the
cellular topology. The network area is represented by a single Location area.
The smart modulation scheme termed as SMNAT (Smart Mobile Network Access Topology) has
been proposed for global mobile network and for Device to Device Communication envisaged for 5G.
Further, we had also delved in the various application scenarios, namely Machine to Machine
communications Intelligent Automotive Communications.
Wireless communication based on colour signals is another form of ‘physical layer network
addressing’ which has been proposed in subsequent chapters. The implementation scenarios set out in
this thesis are Wireless Local Loop (WLL) communications and voice transcoding.
Related to this research work, we have 7 conference papers (World Congress USA, IEEE Conferences
in Europe, ITU Conference in Geneva), 2 patents (1 granted, 1 pending) and 5 published peer
reviewed papers in European and American Journals. 1 more paper is expected to be published
shortly.
Our research has been able to garner interest of telecom community (GSMA) and was featured by
BBC Technology news during Sept 2011.
• To address the issue of the signalling storm and to propose a Smart Multiple Access Scheme
to alleviate the mobility management process and reduce the signalling interaction between
the devices and the network
• To propose a Mobility Management Scheme following the lines of the previous objective
• The next generation mobile network paradigm would not only attain high bandwidth per user,
but would also optimise the network processes by trimming down the interaction between the
mobile device and the network.
The scope of the study is to bring out a global architecture for mobile communications beyond 4G
where we focus on realisation of a smarter access methodology and mobility management framework.
The main contribution is related to the possibility to address the user at physical layer. We used
various mathematical techniques to work out the spectral efficiency, capacity, physical losses and
hence propose an appropriate coding scheme for signalling and data.
v
Dansk Resume
De faktorer, der vil drive ontogenesis af næste generation af mobile netværk er nemlig udviklingen af
de mobile enheder, og nogensinde gradvist stigende efterspørgsel efter datatrafik udløst af
udbredelsen af smartphones og dongles. Pågribe en eksponentiel vækst i antallet af mobile brugere,
vil cellen størrelse af mobilnettet skrumpe. Til sidst vil der være en bølge af signaleringsmeddelelser
byttes mellem enheden og netværket på grund af en stigning i handover relaterede aktiviteter. Forsøg
bør gøres for at reducere interaktionen med netværket og forenkle mobilitet og placering management
processer. Vi mener også i denne afhandling den stadigt stigende efterspørgsel efter data trafik på
grund af de nye generation af mobile enheder; vi fastsat en teknisk arkitektur et mobilnet til forkorte
de indviklede mobilitet og placering management processer samt adressering princip at gøre mere
operationelle effektivitet og imødekomme behovene hos de data sultne applikationer, som vi forudser
for de næste generation af enheder og netværk . Vores primære målsætning er at foreslå en teknik til
trådløs kommunikation, hvor vi gør intelligens til det fysiske lag til at deltage i nogle processer, som
ellers begrænset til højere lag signalsystemer aktiviteter, som for eksempel, adressering af en knude.
Hvis vi har en metode til at aktivere brugeren identifikation med henblik på mobilitet forvaltning ved
at gennemføre lavere lag processer, kan vi forenkle eller fjerne lag 7 processer og dermed reducere de
forviklinger og omkostninger mobile netelementer og bruger udstyr.
I stade mobilnet, starter håndsættet en kontrol budskab i en given periodicitet til at opdatere sin
placering mod netværket. Overdragelsen kræver udveksling af væsentlige kontrol kanal beskeder via
de såkaldte signalering kanaler ". Disse netværk procedurer tylle regnekraft i håndsættet / netværk,
signalering ressourcer, og også løbe ud batteriet i enheden.
Den smarte graduering præsenteres i denne afhandling abets identifikation af brugerne af nettet til
højre ved det fysiske lag og lindrer applikationslaget fra prosaiske aktiviteter i forbindelse med
adressering og mobilitet til et betydeligt omfang. Mærkbart, i alle eksisterende mobil
netværkstopologier, graduering ordninger er udelukkende beregnet til transport datasymboler for alle
brugere i komplekse plan (bruger-id er ikke muligt i lag 1). Vi foreslår at drifte fra dette paradigme og
aktivere bruger-id og mobilitet på fysiske lag. Som en direkte konsekvens, den uophørlige signalering
inter-udveksling mellem netværket og enhederne reducerer manifold, da netværket ikke nødt til
konstant at spore mobil station inden for dækningsområdet. Dette frynsegoder røret ydeevne også.
Nano mobile anordninger til 'menneske til menneske "eller" maskine til maskine' applikationer har
ukrænkelige begrænser at operere i et mobilt netværk, på grund af begrænset magt ressource og
begrænsninger i RF-udgangseffekt. Med State-of-the-Art mobilnet, som det står i dag, optimeret drift
af en nano mobile enhed er uholdbar. Bare fordi det vanhelliger betydelige ressourcer udelukkende
opretholde sin tilstedeværelse i netværket. En mobil netværk baseret på intelligent placering ledelse
og adressering giver en elegant løsning til at løse disse basale behov og hjælper med at fremme denne
nye race af mobile enheder. Netadgang design er forenklet med mindre ressource sultne processer i
forbindelse med mobility management. Dette er på linje med vores bestræbelser på at gøre det mobile
netværk renere, grønnere og slankere.
For en typisk lukket brugergruppe type netværk, foreslår vi en multiple access mekanisme og
netværkstopologi der vil fjerne inddragelsen af intelligente kerne netværk supplementer i netværket
området, og til at bruge denne intelligente fysiske lag for direkte at komme enhver node via air
interface i dækningsområdet. Nogle typiske implementeringer kan være automotive
kommunikationssystemer, firmanetværk campus netværk, jernbanenet mv, der anvender lukkede
nummersystem og dækning inden for EF-nettet. Dette system er "tilstedeværelse agnostiker« dermed
netværket ikke er klar over den nøjagtige placering af det mobile knudepunkt i netværket område.
vi
Derfor er mobiliteten management processen ikke planlagt. For en grundlæggende lukket bruger
nettet, er designet ikke følge den cellulære topologi. Netværket Området er repræsenteret ved et enkelt
sted område.
Er blevet foreslået smart graduering betegnes som SMNAT (Smart Mobile Network Access Topologi)
til global mobil netværk og til Enhed til enhed Kommunikation planlagt for 5G. Desuden havde vi
også dykket i de forskellige anvendelsesområder scenarier, nemlig maskine til maskine
kommunikation Intelligent Automotive Communications.
Formålet med denne forskning er at foreslå en arkitektonisk alternativ til 4G / 5G på grundlag af
pågribelsen af de forskellige smerte punkter relateret til State-of-the-Art, og at løse dem ved med
tiden at realisere en ny mobil netværk rammer en ny multipel adgang metode og en intelligent
mobilitet forvaltningsmodel.
Trådløs kommunikation baseret på farvesignaler er en anden form for "fysiske lag netværk
adressering", som er blevet foreslået i de efterfølgende kapitler. Scenarierne implementering fastsat i
denne afhandling er trådløse abonnentnet (WLL) kommunikation og voice omkodning.
Relateret til dette forskningsarbejde, vi har 7 konference papers (World Congress USA, IEEE
konferencer i Europa, ITU i Geneve), 2 patenter (1 indrømmet, 1 behandling) og 5 publicerede peer
reviewed artikler i europæiske og amerikanske tidsskrifter. 1 flere papirer forventes at blive
offentliggjort om kort tid.
Vores forskning har været i stand til at samle interesse telecom samfund (GSMA) og blev præsenteret
af BBC nyheder om teknologi i løbet af september 2011.
• For at løse spørgsmålet om signalering storm og foreslå en smart Multiple Access Scheme at
afhjælpe mobilitet management processen og reducere signalering samspillet mellem enheder
og netværk
• Den næste generation af mobile netværk paradigme ville ikke blot opnå en høj båndbredde
per bruger, men også optimere nettet processerne ved at trimme ned samspillet mellem den
mobile enhed og netværket.
vii
Acknowledgement
The journey of the PhD is a life changing experience for me. It would have not been possible without
the guidance and support of some individuals whom I desire to thank.
Professor Ramjee Prasad, my PhD supervisor, supported and inspired me relentlessly throughout the
course. He helped me to gather confidence in bracing all the problems that I had faced during the
research. Completion of my thesis had been possible only with his excellent guidance, encouragement
and blessings. Words are short to express my deep sense of gratitude towards Professor Prasad.
I will forever be grateful to my co-supervisor, Prof Ernestina Cianca for her tremendous help in this
reaserch. She helped me to steer the research in the appropriate direction. I am indebted to her
valuable advice, her brilliant insights, constructive criticism and extensive technical discussions.
I am extremely thankful to Susanne Nørrevang for the excellent administrative support all throughout
the course.
I would thank my colleagues of Belagcom International Carrier Services for their support and
encouragement.
Finally, I would like to thank my parents, my wife, my son for inspiring me all throughput this
journey.
viii
Table of Contents
Abstract ............................................................................................................................................... iv
Main Contributions of the thesis .......................................................................................................... v
List of Acronyms ................................................................................................................................ xi
List of Figures .................................................................................................................................... xii
List of Tables .................................................................................................................................... xiv
List of Charts..................................................................................................................................... xiv
Introduction .......................................................................................................................................... 1
1.0. Background ............................................................................................................................. 1
1.1. Organisation of Chapters ........................................................................................................ 5
1.2. Brief Description of the chapters: ........................................................................................... 6
1.3. References:.............................................................................................................................. 8
Problem statement, related work, motivation and Objectives............................................................ 10
2.0. Introduction and problem statement ..................................................................................... 10
2.1. Related work and the issues.......................................................................................... 12
2.2. SoftRAN: Software Defined Radio Access Network ................................................... 17
2.3. Network Interoperability issues with non-human device types .................................... 18
2.3.1. Machine to Machine ................................................................................................... 18
2.3.2. Intelligent Vehicular networks.................................................................................... 19
2.3.3. VANET (Vehicle Area Networks) implementing IEEE 802.11p ............................... 20
2.3.4. IVC using DOLPHIN ................................................................................................. 21
2.4. Vehicular Closed User Group network essentials ........................................................ 21
2.5. Nano Networks ............................................................................................................. 21
2.6. Motivation and objectives ............................................................................................ 22
2.7. Objectives and Synopsis of the proposal ...................................................................... 23
Smart Mobile Network Access topology ........................................................................................... 24
3.0. Introduction .................................................................................................................. 24
3.1. Novel multiple access scheme ...................................................................................... 24
3.2. Frequency scanning ...................................................................................................... 27
3.3. Address of mobile node as a function of time frame, time slot and symbol ................ 30
3.4. User Identification and call establishment between the mobile nodes employing physical
layer addressing. ........................................................................................................................ 33
3.5. Employing the physical layer modulation for addressing the nodes of a network –
Simulation 38
3.6. Introduction of guard band ........................................................................................... 42
3.7. The Network Topologies in the light of the proposed Multiple Access Scheme ......... 43
3.7.3. Frame formation in the Downlink and Uplink ............................................................ 45
3.8. The synchronisation mechanism .................................................................................. 50
3.9. The functionality and the architecture of the coordination processor .......................... 52
4.0. Introduction ........................................................................................................................... 58
4.1. High Level description ................................................................................................. 59
4.2. Mobility and Handover ................................................................................................. 59
4.2.1. Algorithm for handover .............................................................................................. 61
4.2.2. Call Flow for the cell handover .................................................................................. 62
4.3. Determination of the timing frequency for address symbol transmission and the data bit
transmission. .............................................................................................................................. 64
4.4. Comparison of the proposed Multiple Access Schemes............................................... 66
4.5. Comparison of the technologies ................................................................................... 68
4.6. Addressing and Numbering Plan followed for the global mobile network .................. 69
ix
4.7. Comparative analysis of the signaling processes and overhead for mobility management in
the State-of-the-Art and the proposed smart network................................................................ 69
4.8. Synopsis of Mobility and Location management in LTE ............................................. 69
4.9. Location update in ........................................................................................................ 73
4.10. SMNAT as enabler of Device to Device communication ............................................ 75
4.11. Implementation of SMNAT for in-band D2D and interoperability with WISDOM .... 84
4.12. Description of network elements of SMNAT and the call flow for session establishment.
85
4.13. Decision by the network to initiate D2D leg based on cooperative communication .... 87
4.14. Security aspects in light of cooperative communication between 2 devices in cellular D2D
mode 87
4.15. Comparison between the D2D approaches related to radio resource allocation management
(network coding, fractional frequency reuse) and SMNAT. ..................................................... 89
Channel Impairments and error control mechanisms......................................................................... 91
5.0. Introduction .................................................................................................................. 91
5.1. Proposed Error Correction mechanism for the Time Slot acting as the Addressing Channel.
92
5.2. Calculation for Symbol Error (Ps) and Bit Error (Pb) for 8 PSK with SNR = 15 Db. . 95
5.3. Proposed channel coding mechanism for the traffic channel. ...................................... 96
5.4. Conclusion .................................................................................................................... 98
Application of the Multiple Access Technology in the Wireless Local Loop. .................................. 99
6.1. Present Applications/Implementation of WLL ........................................................... 100
6.2. Proposal for employing the proposed Multiple Access technology for Wireless Local Loop
implementations ...................................................................................................................... 100
6.3. Colour Pixel multiplexing in Access layer for wireless devices for the WLL network.101
6.4. Architecture of a WLL network based on Colour Signals.......................................... 103
6.5. System Model ............................................................................................................. 107
6.6. Example ...................................................................................................................... 110
6.7. Signal Bandwidth ....................................................................................................... 111
6.8. Amplifier bandwidth and slew rate requirements ....................................................... 111
6.9. Conversion of voice to colour signals ........................................................................ 112
6.10. Amplitude Modulation (based on modulation of the saturation level) on the chroma signal
for voice / data traffic conveyance .......................................................................................... 113
6.11. Spectral Efficiency ..................................................................................................... 114
6.12. Advantages of CPMA in light of the various factors essential for the Network Operations
114
Multisource Voice coding technology using colour coding technique for high definition voice
transmission ..................................................................................................................................... 116
7.1. Description ................................................................................................................. 116
7.2. The channel coding scheme : Vocoding and conversion of speech to colour signals 117
7.3. Deriving the Amplitude and Phase from the FFT Bins to derive the color signals .... 118
Conclusion and Future Work ........................................................................................................... 123
8.0. Introduction ................................................................................................................ 123
8.1. How do we aim to achieve the objectives : ................................................................ 124
8.1.1. Propose a Hierarchical Smart Modulation scheme ................................................... 124
8.1.2. Propose a smart Cell Design ..................................................................................... 124
8.1.3. Propose a Smart Network Design ............................................................................. 125
8.2. Summary of the present issues with the existing topologies : .................................... 125
Inference .................................................................................................................................. 126
8.3. Parallelism .................................................................................................................. 126
8.4. Prognosis .................................................................................................................... 127
8.5. Advantages ................................................................................................................. 127
8.6. Conclusion .................................................................................................................. 128
Bibliography ............................................................................................................................ 130
Appendix 1 .............................................................................................................................. 134
x
List of Acronyms
xi
List of Figures
xiii
List of Tables
Table 1: Signaling message length and network acquisition time for various network
operations for users. ............................................................................................................ 15
Table 2: Comparison between proposed (Novel ) scheme and GSM/CDMA. ...................... 69
Table 3 : Parameter values for the example to derive the number of users that can
simultaneously use the service........................................................................................... 110
List of Charts
xiv
1 Introduction
1
Introduction
1.0. Background
A study by the World Bank titled "Information and Communications for Development 2012"
provided a statistics that three-quarters of the world's people have access to a mobile device. The
number of worldwide mobile subscriptions grew from less than 1 billion in 2000 to over 6.7 billion
today (vide Chart 1). "Mobile communications offer major opportunities to advance human and
economic development -- from providing basic access to health information to making cash payments,
spurring job creation, and stimulating citizen involvement in democratic processes," World Bank Vice
President for Sustainable Development Rachel Kyte said in a press statement.
Close to 5 billion of the subscriptions are in developing countries, and mobile subscriptions in low-
and middle-income countries increased by more than 1,500 percent between 2000 and 2010, from 4 to
72 per 100 inhabitants. This is equal to around 67 percent of the world’s population. Chart 2 & Chart
3 indicate some details of the evolution of mobile penetration across the developed and developing
world and across the continents.
2 Introduction
Chart 2 Distribution of Mobile penetration across the developed and developing world
The concentrations of the mobile users, especially in the developing countries, are in the urban
regions.
Some of the key proponents for high urban cellular user density impact on cellular mobility,
distribution and penetration are
Economic liberalization policies can increase the degree of spatial centralization of resources
and spatial concentration of manufacturing in large metropolitan areas.
Talent / human resources required for the industry are centralized in the metros in many cases
Economies of agglomeration Infrastructure, availability of raw materials , transport
facilities , proximity of customer and supplier.
Chart 4 is a dashboard highlighting the primary components for industrial growth which is
one of the factors for growth of mobile subscribers.
Social mobility measures the degree to which people’s social status changes between
generations.
More children born in poorer families can , in later life, elevate their social status by
achieving economic success by virtue of their own talents and motivation.
As a result, in many cases the poorer families living in the rural regions migrate to metros for
a better living, and to work in the industrial regions.
This trend is prevalent especially in the developing countries (China, India) due to wage gap
and it directly contributes to mobile user clusterisation in metros.
Demonstration effect / lifestyle changes
Enterprise Mobility:
Enterprise mobility is the trend toward a shift in work habits, with more employees working
out of the office and using mobile devices and cloud services to perform business tasks.
The term refers not only to mobile workers and mobile devices, but also to the mobility of
corporate data. An employee may upload a corporate presentation from his or her desktop PC
to a cloud storage service, then access it from a personal iPad to show at a client site, for
example.
4 Introduction
Enterprise mobility can improve employee productivity, work life balance of the employees,
decrease operational cost like optimisation of office space, power , logistics etc.
Enterprise mobility can help in reducing urban cellular clusterisation.
Technical challenges and adaptation in mobile networks due to the high proliferation of
devices:
Serve more users per cell actuate better frequency reuse, deploy more cells smaller in sizes
Serve more traffic volumes per carrier attain higher spectral efficiency
More cell to cell movement of user Optimisation of cell handover procedures
Crunch of addresses Addition of users imply more mobile numbers. So number
management needs to be optimised.
Higher data rate requirement per user and network due to user growth, advent of new
generation smartphones, social networking through mobile devices implementation of new
multiple access techniques like OFDMA (Orthogonal Frequency Division Multiple Access).
Apart from the factors mentioned above contributing to elevation of the global subscriber base, is a
new breed of equipment called Machine to Machine cellular device which we find everywhere in the
modern world. Some examples are the vending machines, electric meters, Point of Sales (PoS),
automobiles.
Due to high penetration of mobile users, the cell sizes will shrivel. Hence the location and
management and handover related messages will increase. This has a collateral impact on the
bandwidth, spectral efficiency, capital and operational expenditure of the network.
All the emerging technologies aim to attain a higher data speed with the available media resources.
The basic network design however remains the same. We see heavy use of signaling, complex
mobility management processes and intricate honeycomb cellular architecture. With the advent of
IMS and LTE there is an attempt to move towards all IP architecture [10][23][24], but the basic
network processes are too close to the predecessors. Following the evolution trail from 2G to 4G, we
do not discern a significant philosophical drift or focus towards simplification of the basic processes
related to mobility and location management. We see the service logic for handover, frequency reuse,
location updates /cancellations in 4G as compared to 2G [18][25]] have the same roots. With all the
existing and the upcoming technologies, we do not perceive a significant improvisation to simplify the
mobility management process and reduce the control signaling between the device and the network in
order to ward of the possibility of a signaling storm which is brewing up in the LTE (4G) Networks.
Hence we propose a network architecture based on Smart Multiple Access topology which renders
intelligence to the lower layers of the network .This relieves the Application layer from handling the
Mobility management and addressing functions. It directly employs the physical layer to actuate the
same.
5 Introduction
All the mobile network technologies, namely GSM, UMTS, W-CDMA, CDMA and LTE are based
on various blends of Multiple Access techniques. Some examples are Time division, code division,
Orthogonal Frequency division, but in all those concepts the data plane carry symbols destined
towards the different users in the network plane. Typically, location management and addressing are
done by the higher layer, namely layer 7 of OSI, called the application layer.
With all these evolving technologies, the barriers are fixed. We have the Shannon bound with the
permissible Signal-to-Noise ratio, same physical effects to distort the signal, spectrum and speed
constrains. Most of the new generation technologies still attempt to conceive higher and higher data
speed within the Shannon bound. The multiple access technologies that are used are fixed. With all
the evolving technologies, we still have the CDMA, OFDMA (for LTE), TDMA and so on. With all
these available multiple access technologies, we manipulate the way the symbols are carried over the
complex plane, mainly with the attempt to enhance throughput.
We attempt to drift from this basic philosophy. We believe that if we find a way to engage the access
mechanism not only to carry information for all the users, but also to render the intelligence to
identify and address the users, the complexity at the higher layers is reduced to a considerable extent.
The design of the network elements and the mobile nodes is simplified which also contributes to
reduce the set up cost. Our research work aims to unfold a new mobile network technology based on a
unique multiple access technique and a new access and core network topology.
With this technology, we thrive to shift some specific functionalities pertaining to layer five and seven
mobility towards the lower layers, namely layer two and one. Hence we make the physical and data
link layer more intelligent and involve them directly in the task of addressing the nodes. While we
make the lower layers more intelligent, the tasks / processing by the higher layer diminish. This
reduces the processing power required in the access and core layer network equipments making them
cheaper. Also makes the interaction between these networks less resource intensive and overall
reduces the complexity of network design and operations.
In this research proposal, we present this new technology and highlight its benefits over the existing
topologies. We also investigate the problematic and cost ineffective areas of the present mobile
technologies and provide an analysis how we can draw the benefits on these aspects from the
proposed technology.
Description: All the mobile network topologies from 2G to LTE- Advanced share a common
philosophy for access network design either on TDM (2G) or IP(4G) . They have the same
mechanism of addressing and location management. Handover principles are comparable and the
handover success rate depends on various factors including frequency allocation in the cell and the
frequency reuse factor. These processes are the key to the QOS, Call Maturation rate, Efficiency and
success rate for handover. It demands careful network introspection, design and operations which is a
resource centric activity. The complex framework of control plane for the signalling operations
consumes considerable channel bandwidth and processing power in the network devices. All this
contributes to an increase in cost of the Network setup and its operations.
This chapter attempts to study the various factors that convolutes the design, implementation and
operations of a present day mobile network, and paves the way for proposing a new network
topology, which is fundamentally different, easy to implement and operate and also brings new
promises for making the next generation services affordable to all.
We discuss here the novel multiple access scheme, Smart Mobile Network Access Topology
(SMNAT) and its implementation in light of different network topologies. The multiple access
schemes in the ITU and ANSI domain use a common methodology of conveying the user information
by the symbols in the complex plane. The proposed methodology however drifts away from this
philosophy, where we also involve the symbols partly for the purpose of addressing and identifying
the node in the network area. This novel multiple access methodology finds suitable application in
different network topologies, starting from closed user networks, small sized networks to global
roaming networks [1][15]. In this chapter, we discuss the implementation scenarios in closed user
group networks with fixed addressing mechanism. The chapter also focuses on the feasibility study of
implementation in scaled down mobile networks, like campus networks, railways or petroleum plants.
Chapter 4: Deploying the Novel Multiple Access Scheme (SMNAT) for a Global Mobile
Roaming Network and for Device to Device Communication
In this chapter, we discuss the application of the Multiple Access scheme for a Global Roaming
Network [1][15]. Mobility and the location management is the key to the success of roaming. The
chapter introduces a new cellular design, frequency allocation and reuse per cell, and new handover
mechanism. Here, we see the geometrical shape of the cell has changed and we propose a simple
black and white checker board approach for Network design and frequency allocation. Our endeavour
is to render simplicity, enhance performance and to reduce the associated network processes and
signalling overhead. We discuss the architectural concepts for a global mobile network in light of this
novel multiple access technologies. Following this, we study the implementation feasibility for
Machine-to-Machine devices, intelligent vehicular communication network and nano mobile devices.
Further we investigate how SMNAT can be a proponent for Device to Device (D2D) communication
which is one of the primary differentiators of 5G. The existing 5G research groups proposes
techniques to realise D2D communication for the devices in proximity, may be in the same cell or in
neighbouring cells. However SMNAT may make it possible to actuate D2D communication even
7 Introduction
when the paired devices are separated by a distance and located in cells which may belong to different
location areas.
Chapter 5: Channel Impairments and the proposal of an appropriate error correction scheme
By this time, we understand the potential and the benefits that we can derive out of this new
technology compared to LTE and 2G/3G. But alike the other technologies, it is also subject to the
physical effects and will be prone to errors if the right solution for error correction is not chosen.
This chapter is meant for discussing the subject related to the channel impairment due to the physical
effects, like reflection, scattering and fading. This happens for all types of mobile networks, but the
impact is far-fetched with the proposed network topology than compared to the present one
[1][15].This is because the multiple access scheme directly takes part in addressing for the mobile
node, and any misinterpretation of symbols in this plane should be avoided. This can jeopardise the
practicality of such a multiple access scheme. Hence we propose the appropriate error correction and
coding mechanisms to render robustness and accuracy and make the technology viable for
implementation and operations for mobile networks.
Chapter 6: Colour Pixel Multiple Access for Wireless Local Loop deployment
Our research will remain incomplete if we do not cover the technologies which are based on the last
mile access, namely the WLL. We propose a unique Multiple Access mechanism called Colour pixel
Multiple Access [3][17], which can be deployed over the existing cable TV framework. It uses the
same concept of deploying the symbols for addressing a user. The only difference being that the
symbols of a complex plane are represented by colour dots (with a Hue and Saturation level) with
fixed coordinates in a colour circle. Here each user will be represented by a colour level (Hue and
Saturation level) and a specific colour pixel coordinate, reutilising the existing digital colour
broadcast technology. Colour is directly used for addressing. It is also used to carry voice and data by
utilising the variation of the amplitude levels (saturation levels). This unique patented technology
brings vast promises in communication technology and we begin with the implementation aspect in
the purview of WLL Network. This chapter discusses the details of this technology and proposes the
WLL network Architecture in light of this new technology.
Chapter 7: Multisource Voice coding technology using colour coding technique for High
Definition voice coding for mobile networks.
This chapter addresses a mechanism for multisource voice coding technology using colour coding
technique (as proposed in chapter 5) for high definition voice transmission [4]. The audio information
is mapped into colour information with the help of the intelligence derived from a phase vocoder.
Each pixel in the video frame, meant for the transmission of the audio signals over video, pertains to a
specific frequency in the time domain. A couple of harmonic frequencies along with the fundamental
frequency are required to be processed for carrying the voice intelligence. Hence, for conveying a
speech signal for a given user, a number of colour pixels are utilised. This implies that the number of
users that can be accommodated depends on the resolution that is supported by the video encoding
scheme and the QOS needed for carrying the voice. At the source, we actuate phase vocoding and
colour pixel multiplexing. This part can be termed as channel coding as we encode each harmonic in a
suitable pixel and thereby render redundancy to the original information. The video stream which
comprises number of pixels per frame pertaining to the resolution is multiplexed at the source and
then transmitted using an appropriate lossless source coding scheme.
The following section lists our papers published/presented on this topic in International journals and
International Conferences. The technology was featured by BBC Technology News, the reference to
which has also been included.
1.3. References:
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5474027&ur
l=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3
Farnumber%3D5474027
3. Rajarshi Sanyal , Ernestina Cianca, Ramjee Prasad, Colour Pixel 5 The Colour Pixel Multiple Access
Multiple Access- A multiple Access Technology for Next technology is defined in this section. In
Generation Mobile Networks’ at International Conference on the thesis chapter, we however focus
Wireless Networks (ICWN 09),2009 World Congress Computer more on its application in WLL
Science, Computer Engineering and Applied Computing at USA technology
a. Ref : http://dblp.uni-trier.de
4. Rajarshi Sanyal ,Transmission of Audio signals from multiple 6 The application of the colour Pixel
sources riding on single lossless streaming video channel using Multiple Access technology High
Phase vocoder by applying Joint Source Channel Coding technique, Definition vocoding is covered by this
.Communication In Computers (CIC07): 2007 World Congress in paper and chapter.
Computer Science , Computer Engineering and Applied Computing
in Las Vegas USA.
a. Ref : http://dblp.uni-trier.de
5. Rajarshi Sanyal, ‘ Framework for Realizing mobile and computer 5 The basic framework of Colour Pixel
communication through color signals’ 2006 World Congress in Multiple Access technology where the
Computer Science , Computer Engineering and Applied Computing layer 2 is used for both addressing and
in Las Vegas , USA. data communication is defined.
a. Ref : http://dblp.uni-trier.de
6. Rajarshi Sanyal, Mobile and Computer Communications Through 5 The basic framework of Colour Pixel
Colour Signals - An Approach Note. WINSYS 2006: 73-78 , Multiple Access technology and its
Portugal implementation in mobile network is
covered here. However, the thesis chapter
focuses more on its implementation in the
WLL networks.
7. Rajarshi Sanyal , 'Challenges in Interoperability and Roaming 1 Referred in the chapter to highlight the
between LTE - Legacy core for Mobility Management, Routing, interoperability issues between LTE and
Real Time Charging ' ITU WORLD 2011 , presented in Geneva on 2G/3G.
26th October 2011 , published in IEEE
Explore.http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=610
0941
9 Introduction
1.Sanyal, R., Cianca, E. and Prasad, ‘Smart mobile networks with 3 The description of the global roaming
intelligent physical layer actuating mobility management’, Int. J. Mobile network in light of the Multiple Access
Network Design and Innovation, Inderscience Publishers 2012 Vol.4, Technology in described in this paper
No.2, pp.91 - 108
2 Sanyal, R., Cianca, E. and Prasad, R ‘Nano mobile network based on 1&3 Issues with Nano mobile devices
Smart Location Management and Addressing’, Int. J. Mobile Network operating within the State-of-the-Art
Design and Innovation, Inderscience, Vol. 4, No. 3, 2012 mobile network are discussed in
chapter 1, The description of the global
roaming network in light of the
Multiple Access Technology in
described in chapter 3
3 Sanyal, R., Cianca, E. and Prasad, R, ’Challenges for Coexistence of 1&3 Related work and Issues with M2M
Machine to Machine and Human to Human Applications in Mobile devices operating within the State-of-
Network: Concept of Smart Mobility Management, International Journal the-Art mobile network are discussed
of Distributed Sensor Networks, Hindawi publishers, Volume 2012 in chapter 1, The description of the
(2012), Article ID 830371, 12 pagesdoi:10.1155/2012/830371. global roaming network in light of the
Multiple Access Technology in
described in chapter 3
4 Sanyal, R., Cianca, E. and Prasad, ‘Closed User Group Automotive 1 & 2& 3 Related work and Issues with IVC
communication network based on addressing at physical layer’, devices operating within the State-of-
International Journal of Interdisciplinary Telecommunications and the-Art mobile network are discussed
Networking. IGI Global publishers USA, Volume 4, Issue 4. , 2012. in chapter 1, IVC within CUG Network
is defined in Chapter 2.The description
of the global roaming network in light
of the Multiple Access Technology in
described in chapter 3
5. Sanyal, R., Prasad, Enabling Cellular Device to Device Data Exchange 3 Description of 5G landscape and
on WISDOM 5G by Actuating Cooperative Communication Based on deployment of SMNAT for WISDOM
SMNAT, International Journal of Interdisciplinary Telecommunications 5G
and Networking. IGI Global publishers USA, Volume 6, Issue 3,2014
6. Sanyal, R., Cianca, E. and Prasad, ‘Novel WLL architecture based on 5 The basic framework of Colour Pixel
Colour Pixel Multiple Access implemented on a Terrestrial Video Multiple Access technology and its
Network as the overlay’, International Journal of Interdisciplinary implementation in mobile network is
Telecommunications and Networking, IGI Global publishers USA covered here. However, the thesis
Volume 5, Issue 1,2013 chapter focuses more on its
implementation in the WLL networks
Sanyal, Rajarshi : “Framework for Realizing Mobile Network Through 5 The basic framework of Colour Pixel
Color Signals” Patent App. Multiple Access technology and its
No. 0163/MUM/2006, Govt. of India, February 2006). implementation in mobile network is
covered here. However, the thesis
chapter focuses more on its
implementation in the WLL networks
Sanyal, Rajarshi :”A system of wireless networking of computers in the
UHF”, Patent
Document (Pat. No. 188052, Govt of India, October 1995)
10
2
Problem statement, related work, motivation and
Objectives
The 5th and 6th generation of mobile networks are envisioned to realize the bandwidth required for
WWWW (Wireless Worldwide Wide Web). They should be highly dynamic in nature and actuate self-
optimization of resources to support the bandwidth for ever increasing customer base. Spectrum crunch is
one of the major issues. Hence these networks should strive to achieve very high spectral efficiency and
less Carrier to Interference ratio (C/I), relative to the existing technologies like LTE and WIMAX. Data
speed per user should also not be compromised.
In brief, the key challenges for the 5th and 6th generation of the mobile technologies are the following.
• High data rate over large coverage areas and dense demographies.
• Meet the bandwidth, latency, QOS requirement for supporting the next generation network and
device applications.
• Lessen the complexity in the access (radio) and core network layers.
Living through the advancements in mobile network technology from 2G and then through 3G – UMTS
and finally to LTE (4G), we notice that the primary emphasis is to enable higher bandwidth per user
required to drive the next generation network and device applications.
With the evolution of the mobile networks as we find from 2G to 4G [18][25], we attempt to inject more
symbols (data) per unit time. This has been made possible by the evolution of the modulation schemes
from BPSK in case of 2G, to 64 QAM for LTE-Advanced.
Problem statement, related work, motivation and
objectives
11
In the current Mobile Radio Access Network [9], [20], [21] there are a host of network processes, tightly
synchronized and orchestrated by intelligent network elements, such as:
• Handover management
• Location management
• Feature management
These processes involve complex signaling operations across the radio and the core network. The attempt
to simplify the network in IMS [10][23] and LTE[24] is focused to make the core and access networks all
IP. Following the evolution trail from 2G to 4G, we do not discern a significant philosophical drift
towards simplification in terms of the service logic related to mobility and location management. We see
a similar process for handover, frequency reuse, location updates and cancellations in 4G as compared
with 2G. Hence the network elements of the State-of-the-Art still need to be equipped with the
intelligence and processing power to handle all these complex signaling operations. This has a knock on
effect on the handsets too. It involves considerable amount of processing power, thus leading to more
battery drainage. So it is imperative to look beyond the State-of-the-Art and conceive a technology which
is devoid of these constrains and is ideal for the next generation mobile devices. It is worth mentioning
the Telenor’s research to address the issues of mobility management in next generation networks [25].
The same goes for core network design. Mobility and location management in the core network
necessitates a substantial volume of signaling interaction between the HLR/HSS (Home Location Register
/ Home Subscription Service) and the MSC/VLR (Mobile Switching Center/ Visited Location Register).
Inefficient and un-optimised engineering and design of these Network Elements impacts the service
assurance, and finally degrades to the overall QoS offered by the network. Also, a substantial amount of
resources are used up for addressing the wireless node in the cellular network, both from the perspective
of available bandwidth and also the associated processing activities carried out in the different network
elements at the Radio Access Network (RAN) and Core Network (CN).
Managing a mobile network is hugely resource and knowledge intensive, primarily because of the
inherent complexity of the network architectures. For example, during cell planning we need to consider
the traffic demand to cover a specific region, availability of base station sites, available channel capacity
at each base station, and the service quality at various potential traffic demand areas. The allocation of the
right frequency at the cells to get an optimum frequency reuse factor is crucial to achieve smooth
handovers, avoidance of call drops during handover, and overall elevate the performance of the network.
These are part of the overall cell planning activity and it requires a lot of resources, in terms of FTE (Full
Time Equivalent) and hence it increases the operational cost.
The switching (time/ space) matrix of a Mobile Switching Center of a 2G/3G network has a finite limit to
make and break the number of calls. The Busy Hour Call Attempt handling capacity of a Switch depends
much on engineering and dimensioning of this matrix. With the CSCF (Call Session Control Function)
for IMS (IP Multimedia Subsystem) [10][23] and the MMEs (Mobility Management Entity) for the LTE
[24], we do no longer need the time and space switching Matrix. The CSCF / MME acts more as SIP
Problem statement, related work, motivation and
objectives
12
(Session Initiation protocol) router for IMS and SIP/GTP/DIAMETER router in case of LTE. However,
for routing a call, these Network Elements still need to involve directly the Layer 7, which utilize lot of
resources and processing power of these Network Elements. This in turn makes the Network Elements
expensive and increases the capital and operational cost of the mobile network. As a consequence of the
convergence of heterogeneous mobile applications catered by the expanse of the mobile devices
preordained for diverse scenarios (P2P, M2M, IVC), the signaling inter-processes between the network
and the user equipment becomes more intricate. In that respect, our research work showcases an access
topology which emancipates the mobility management process from the application layer which in turn
makes the network LITE and future proof. It renders more horsepower for the network to serve the cutting
edge applications. It also aids in optimization of the network operations in an endeavor to make it more
energy efficient.
The architecture of the IMS/LTE networks[23][24][10] is expected to keep large use of IP and use a large
spectrum of core and access technologies, stemming from the necessity to cater to various types of mobile
applications depending on the device type / capability. Wireless 4G networks create various challenges
due to their architectural heterogeneity in terms of differences between access schemes, resource
allocation techniques and QoS requirements. To address these challenges, the existing proposals require a
significant modification or new Medium Access Control (MAC).
The primary issues that may impact the State-of-the-Art mobile network due to M2M communication are
as follows:
o Radio Network: The eNodeB in the LTE network needs to connect a large number of M2M devices.
The devices will contest to use the same channel leading to collisions.
o Core Network: The MME needs to attach a large number of devices. The network also needs to
provide the IP and NSAPI address to those devices. A lot of devices imply sporadic and transient use
of the bearer, leading to an overhead. The HSS needs to have the subscription and profile definition
Problem statement, related work, motivation and
objectives
13
for the M2M devices. There can be signaling congestion towards HSS when a large number of
devices try to register in the same HSS.
o Unlike a H2H Network, we seldom experience congestion in the data plane for M2M networks. This
is because devices send and receive small amounts of data. But a lot of devices transmit and receive
data simultaneously leading to congestion mainly in the Enhanced Packet Core (EPC) part between
the Serving Gateway (S-GW) [24] and the Packet Gateway (P-GW) [24] . Capacity augmentations
need to be done for adjuncts like MME, HSS, AAA servers, CDR processing engine.
o The goal of 4G is to replace the current proliferation of core mobile networks with a single worldwide
core network standard, based on IP for control, video, packet data, and voice. The IP protocol used is
IPV6, which uses 128 bit addresses vis-a-vis the 32 bit addresses of IPV4 protocol. Hence the IP V6
protocol which is directly used for mobility management in 4G can offer a wider address pool for the
mobile users. This is essential to accommodate all the M2M devices in the mobile network. To
enhance mobility in IPv6, ‘micro-mobility’ protocols (such as Hawaii, Cellular IP and Hierarchical
Mobile IPv6) have been developed for seamless handovers i.e. handovers that result in minimal
handover delay, minimal packet loss, and minimal loss of communication state. However, the core
issues of IPV6 to be involved in mobility management still remains.
Four key issues staggering the operational efficiency of the State-of-the-Art mobile network is as
follows:
o The base IPv6 specification does not provide any form of paging support. Hence to maintain
connectivity with the backbone infrastructure, the mobile node needs to generate location updates
every time it changes its point of attachment, even if it is currently in dormant or standby mode.
Excessive signaling caused by mobility leads to a significant wastage of the mobile node’s battery
power, especially in environments with smaller cell [26]. Therefore, it is impractical to rely
completely on location updates, and it is essential to define a flexible paging support in the intra-
domain mobility management scheme.
o In order to save battery power consumption of devices, IP paging is proposed as an extension for
Mobile IP [25]. Under Mobile IP paging, a device is allowed to enter a power saving idle mode when
it is inactive for a period of time. During idle mode, the system approximately knows the location of
the mobile node within the paging area comprised of multiple subnets. A device in idle mode does not
need to register its location when moving within a paging area. It performs location update only when
it changes paging areas. However, with the high penetration of the M2M devices, the size of the
paging area will reduce. This will culminate in high signaling network load when the M2M device
(say, implemented for a fleet management company) alters the location frequently.
• According to the IPV6 implementation principle for mobility management [25], the mobile node
needs to send binding updates to the home agent in a given periodicity. This action implies that an
authentication procedure needs to be actuated for each bind updates resulting in an increase in round
trip delays.
Problem statement, related work, motivation and
objectives
14
• For these reasons a new Mobile IPv6 node, called the Mobility Anchor Point (MAP), has been
suggested in RFC 4140. MAP can be located at any level in a hierarchical network of routers. The
MAP will limit the number of Mobile IPv6 signaling outside the local domain. As an evolution from
IPV6, Hierarchical Mobile IPv6 (or HMIPv6) proposes the implementation of the MAPs. Networks
are divided into domains and subnets, with each administrative domain having a Mobility Anchor
Point (MAP) at the highest level. Intra domain mobility of a mobile host is handled separately from
inter-domain mobility.
• When the Mobile Host (MH) changes points of attachment within the same domain, the MAP of that
domain is informed of the change in Care of address of the MH through binding updates. Binding
updates are also sent to correspondent hosts within the same domain. This process reduces signaling
traffic due to lesser binding updates. Handoff latency also decreases as ‘far-off home agents’ and
‘correspondent hosts’ need not be updated every time a mobile host changes point of attachment.
IPV6 based mobility management ensures minimal handoff latency to achieve better QoS for real-
time data conveyance. However HMIPv6 has its drawbacks as the hierarchical addressing model may
impact the real time applications. Due to the hierarchical nature of the protocol, each anchor point is
only aware of the next anchor point down in the hierarchy. Each node stores a mapping of source
destination addresses of the previous and next nodes in the hierarchical structure. These addresses are
called VCoAs (Virtual Care of Address) [28]. Only the lowest anchor point in the hierarchy stores a
mapping of VCoA to PCoA which is the physical care-of-address of the MH in the foreign
environment. As the source is aware of only the VCoA of its nearest anchor point, it sets that address
in the destination field header of the IP packet. At each hop, the packet is processed, depending on the
source address, the new destination address (VCoA) is decided. The packet is then forwarded using
the new destination address and the node’s own address as the source address. This processing occurs
at each hop and can effect real time applications running at the mobile device as it creates significant
delay especially if the CH (Correspondent Host) and the MH are many hops away with the MH part
of a big hierarchical structure.
The signaling overhead in GSM for different Access Network related operations is in Table 1.The
operations with respect to the below in Table 1 are related to the signaling channel. The mobility
management messages in LTE have evolved from GSM/UMTS. In this section we step back to
GSM/UMTS to introspect the issue of high signaling overhead in the access network which
extrapolates to the core network.
In GSM, have 4 kinds of signaling channel as in Figure 1. Out of these, the Common Control Channel
(CCCH) and the Dedicated Control Channel (DCCH) take part in transporting the overhead that is
required for these signaling operations. Table 1 shows the overhead required to convey signaling
messages related to mobility management and addressing. Not only it consumes bandwidth, but it
also entails considerable amount of Layer 7 processing between the handset (Mobile Station) and the
Radio Network.
The handset thus consumes battery power to actuate layer 7 functionalities. The Radio Network
elements need to have the required processing power to manage all the complex mobility and location
management processes for all the active mobile users in the Location Area.
Problem statement, related work, motivation and
objectives
15
Each operation as depicted in Table 1 is related to a layer 7 functionality, and hence dependent on a
handshake process. The lead time to complete an operation directly impacts the time to complete an
event, like Call setup, handover, SMS transfer etc. This is indicated in the right most column of table
2 as the acquisition time.
Table 1: Signaling message length and network acquisition time for various network operations for users.
Issue 4: Impact of Network performance and optimisation on cell planning and frequency reuse
Much of the network utilisation depends on how cells are oriented in the network; the frequencies that are
used in the cells and the frequency re-use factors. The frequency reuse factor is the rate at which the same
frequency can be used in the network. It is 1/K where K is the number of cells which cannot use the same
frequencies for transmission. Common values for the frequency reuse factor are 1/3, 1/4, 1/7, 1/9 and 1/12
(or 3, 4, 7, 9 and 12 depending on notation).
In case of N sector antennas on the same base station site each with different direction, the base station
site can serve N different sectors. N is typically 3. A reuse pattern of N/K denotes N sector antennas per
Problem statement, related work, motivation and
objectives
16
site. Common reuse patterns are 3/3, 3/9 and 3/12. Figure 2 depicts the frequency reuse pattern within a
cluster of cells.
If the total available bandwidth is B, each cell can only utilize a number of frequency channels
corresponding to a bandwidth of B/K, and each base station site can use a bandwidth of BN/K.
Hence, the frequency reuse factor is directly related to cell optimization and spectral efficiency.
The cell planning and frequency re-use is done also taking in mind that a good C/I ratio is achieved.
An area to be supplied with radio service is divided into cells. Each of these cells is assigned a range of
frequencies (f1 - f6) and they each have corresponding radio base stations. The group of frequencies can
be reused in other cells bearing in mind that it is not reused in adjacent cells as that will cause co-channel
interference. Co-channel interference results when frequencies are reused in adjacent neighbouring cells.
A reuse distance, D is calculated as :
D = R√3.N
where R is the cell radius and N is the number of cells per cluster.
Frequency hopping is another technique that can increase the spectral efficiency, and the C/ I ratio. But it
is applicable only for the traffic channel, and not for signalling. 4G Networks however attempt to attain
Frequency Reuse Factor of 1 [26], by implementing Dynamic Radio Resource Management. New
generation 4G systems like LTE and WIMAX are designed to support frequency reuse-1 mechanisms to
enable a universal frequency reuse pattern providing operators with best achievable use of their valuable
spectrum. Ever increasing interest is shown by companies and operators to find mechanisms to allow
reuse1 deployments. Of late, new technologies like Inter Cell Interference Coordination (ICIC) and their
application will facilitate universal use of Reuse-1 networks.
Problem statement, related work, motivation and
objectives
17
ICIC eliminates signal interference at cell-edge areas covered by base stations of the 4G (LTE) mobile
phone system. The new technology is able to autonomously allocate frequency bands in order to reduce
radio-wave interference in accordance with user distribution around cell-edge areas of overlapping cells
of each adjacent base station. By deploying this technology to base stations, it is possible to double
throughput at cell-edge areas, which would otherwise experience reduced transmission speeds due to
signal interference.
OFDMA based 4G networks can support reuse one deployment through the use of;
• Ability to power control and vary the coding rate of control channel;
• Fractional power control with coordination with controller based overload control messages in UL;
• Support of very low code rates;
• DL and UL ICIC further enhance single cell frequency reuse;
One of the key goals is to increase spectral efficiency and overall SINR of the system. However, users at
the cell edge are particularly susceptible to increased interference resulting in reduced throughput due to
higher transmit powers required and inter-cell interference. Therefore interference coordination as
methods to reduce inter cell interference is gaining momentum and industry attention. Most of the above
mentioned factors and tasks are dependent on layer 3/5/7 signalling activities. This not only consumes
bandwidth and increases cost, but necessitates the processing of complex operation within the network
devices. The network devices need to interact and interoperate for all these signalling activities, which
mandates the networks elements to be intelligent and fast in processing for attaining a defined QOS.
The inability of the radio network elements to efficiently handle these operations will result in call
failures, call drops, high call setup time, lower ASR (Answer Supervision Rate) and offered network
quality.
Software defined RAN [60] logically aggregates all base stations deployed within a geographical area and
treats it as a virtual big-base station with a three dimensional resource grid. Instead of treating a base
station as an individual entity with its own set of resources , a virtual base station is abstracted as a three
dimensional grid of space, time and frequency slots and code them as a soft radio access control and data
plane. APIs are defined between the radio elements and the control plane which allow radio elements to
Problem statement, related work, motivation and
objectives
18
update the global view at the control plane and also allow the control plane to communicate radio
resource management decisions back to the radio elements.
However, a single base station abstraction cannot be achieved without changes to LTE standards. The
client will continue to sense multiple base stations and at each handover. The eNodes in vicinity of the
eNodeB initiating the handover will coordinate with each other to actuate a smooth handover. However
with SoftRAN, it is anticipated that the handover mechanism will require less resources due to global
cognizance of the channel conditions at various locations in the coverage area. This implies smoother
handover, lesser call drops and diminishing chances of ‘back and forth’ handovers between the same pair
of base stations. With a smoother control on transmit powers across multiple base stations and better
management of interference, the clients would also experience a more stable connection. Conceptually,
SoftRAN is analogous to traditional SDN with a centralised RAN architecture. This logically centralized
entity then maintains a global network view and provides a framework on which control algorithms can
be implemented in a modular fashion.
The concept of Machine-to-Machine (M2M) communications fits into the new trend of devices that we
see around us disseminating information though the mobile network to the remote peer or to the cloud.
These objects have their own Internet Protocol addresses. They are embedded in complex systems and
interfaced with sensors to obtain information from their environment (e.g. food products that record the
temperature along the supply chain).
Some guidelines are given for particular aspects of this M2M technology in report such as ETSI’s TS
102.689 [29]. But a unified approach contemplating the coexistence and seamless interoperability
between the different device types is still ‘work in progress’. This poses a risk, as the State-of-the-Art
mobile networks were designed keeping in mind Human to Human (H2H) communication. Our
contention is that the State-of-the-Art mobile network may not be resilient to the data surge likely to be
caused by M2M applications. It is probable that a group of M2M devices for a particular industry
application may initiate services and access the mobile network at the same time, causing network
congestion and degrading the quality of other services. For example, a fleet management company may
have moving carriers in different geographical locations trying to access the network and upload data at
the same instance. Considering the high proliferation of these devices, an avalanche effect on signaling
and data traffic can be generated, thus impacting the gross QoS (Quality of Service) offered by the
network. It is imperative that the mobility management processes need to be revisited in order to cope up
with the surge in the mobility management messages in the mobile network and to maintain the same QoS
without being heavy on the bandwidth. Attempt should be made to reduce the interaction with the
network and to simplify the mobility and location management related processes.
Problem statement, related work, motivation and
objectives
19
Challenges faced by the present mobile network in the light of the M2M scenarios are:
• Number of M2M devices can be fairly large compared to the H2H devices. So the length of the
addressing parameters that are used today (MSISDN, IMSI or even the IPV6 addresses) seem to
be insufficient to identify the high volume of devices in the network.
• Power management will play an important role. For example, a M2M device meant for location
based application in a freight container will need to sustain for weeks, if not months, may be
without an external constant power source. So the battery power should be carefully conserved,
and one of the effective ways to do so is to reduce the signaling interaction between the handset
and the network to maintain location and presence information.
• Variation of QoS requirements: Some real time applications have high demands on latency and
reliability (as for example, accident sensors). While the other applications like reporting services
may be contended with a lesser priority scheme but with a higher bandwidth requirement.
• Different traffic patterns: Some M2M devices may not transmit any data for months, for example
a crash sensor,while other sensors may transmit data continuously or periodically.
In general vehicular networks have been devised with the concept of vehicle to vehicle/ control center, or
vehicle to roadside communication. The mobile equipment in the vehicle equipped to cater to specific
applications are called On Board Units (OBU). The vehicles can also communicate with other vehicles or
central office for voice or data communication. They can interoperate with the roadside equipments
placed at a given intervals, and are called Road Side Units (RSU). The RSUs can act as base stations or
access points depending upon the modulation technology adopted for the vehicular network.
Application scenarios for vehicular communications can be roughly grouped into safety (e.g. collision
warning, roadwork warning) and non-safety (e.g. voice communication, media, Internet access). These
application types put different and partially conflicting requirements on the system design. Non-safety
applications related to entertainment, information and content has a continuous pattern of data
conveyance over a stable data channel which can reliably transreceive data throughout a vast geography.
Ease of extending coverage, latency and jitter play an important role in determining the Data and service
quality.
In contrast, safety applications data is normally disseminated sporadically on need basis. They may not
require a very high bandwidth. But the data transfer mechanism should be fail safe and reliable.
20
• Group cooperative driving
• Real time monitoring on engine and transmission operating parameters
• Emergency braking of a preceding vehicle.
• Information about blind crossing, school proximity, railway crossing etc…
• Entries to highways.
• Geo location and tracking applications
• High speed internet access.
• Entertainment media applications
• Electronic toll collection.
• Parking space locater in cities.
• Nearest petrol pump, breakdown assistance
In a typical implementation of VANETs, the network is readily accessible via WiFi, DSRC, WiMAX,
3G, LTE, etc [43]. In the introduction we brought out the concerns related to use of traditional 3G/LTE
networks for use in vehicular networks, as it may induce congestion in those networks thus impacting the
service for all users including Peer2Peer. But it renders an important capability to the vehicular network,
which is mobility.
21
Inter Vehicle Communication (IVC) is realised by engaging the car in communication process and
electing it to act as the base station. But this process is hindered when the car acting as the base station
departs from the group. For this reason, in IVC systems it is necessary to use the autonomous dispersion
type of network formation technology in which the existence of a base station is not hypothesized. In
addition, the communications data in the IVC system is driving control data, for actuating “coordinated
driving,” so it must be of high quality and capable of real time transfer. The DOLPHIN (Dedicated Omni-
purpose inter-vehicle communication Linkage Protocol for HIghway automatioN) [42] communication
protocol for use with IVC systems has been developed by OKI Japan. They have adopted the Carrier
Sense Multiple Access (CSMA) method which is well suited as a wireless access method for building
autonomous dispersion type networks and which does not require a base station. Using received signal
strength information (RSSI),carrier sense determination is made, and transmission processing of the
physical frame control part is actuated. When a signal is not sent on time as a result of the carrier sense,
the process is re-performed after a random period of time passes. However, no mobility management
schemes have been considered while designing this system which is the primary drawback of the solution.
The radio unit continually listens to the control channel waiting for instructions. When a call is invoked
the transceiver invokes a digital message over the control channel and informs the central office that it
needs a channel to set up the call .The central office equipment accepts the request for a channel and
assigns a free channel by return digital message over the control channel. The radio unit receives the
working channel assignment and fixes it’s transmit and receive frequencies to the new channel. Following
this, voice communication can commence through the traffic channel. The disadvantage of radio trunking
systems is limited channel capacity and the maximum number of users that can be served simultaneously.
It can only reach a limited number of users. Hence for a large car fleet group, or Railways, Hospitals,
Factories, Cruise ships radio trunking systems are generally not conceded. For a relatively large sized
network active network elements like Mobile Switches, base stations are required for mobility
management .Many of these devices operating in the network space along with the H2H devices increases
the complexity and costs.
22
power storage devices based on fuel cells. They will also derive power from natural sources like solar
energy, but not with conventional solar cells. Nano grass [44] provides a major boost in efficiency to
harness solar power in the new generation mobile devices.
The nano mobile device faces challenges to operate in a mobile network, due to limited power resource
and restrictions in RF power output. Moreover, the RF spectrum needs to be perpetually scanned in real-
time with low power consumption. Significant amount of processing speed and power is needed to run
the algorithms which enable intelligent use of spectrum, gathering channel state information and fast
adaptation to dynamically changing radio environment.
We aim to achieve this by proposing the Novel Multiple Access methodology. Some of the benefits
that we will derive from this are as follows.
1. The access layer does not need intelligent network devices like BTS/BSC which helps in forming the
cellular network area and actuate the location and call management.
2. So faster and cheaper implementation can be achieved.
3. Reduction in mobility management functions moderates the overhead required for signalling
activities.
4. Absence of cellular architecture for Closed User Networks wards off the necessity of cell planning
and management. Peer to peer communication does not involve any intelligent core or access network
elements.
5. For a global roaming network, the cellular architecture is followed. However, it is simpler in design
compared to the existing network topologies, in terms of location management and handoff.
Summing up, this reduces the cost of Setting up a Mobile network plus the cost of operations and
maintenance of the network. As both the access and the core network are more simplified, hence the cost
of cell planning and maintenance is much reduced for a global mobile network. The radio and the core
network elements need to be less intelligent as the Mobility Management part is drastically simplified.
The signalling overhead and signalling operations between the User Equipment and the Core Network is
reduced, implying less time for call set up, more battery power and simplified UE and the RAN (Radio
Access network) / CN(Core Network).Network Efficiency and Quality depends upon various factors
Problem statement, related work, motivation and
objectives
23
related to Mobility management, Location management, addressing, handover network cell design and
frequency allocation. The RRM (Radio Resource Management) implemented in GSM /UMTS/ LTE [11]
is explained below briefly. Our research work proposes an alternative topology primarily attempting to
simplify these processes.
Unlike the traditional multiple access schemes, with this proposed method, each mobile node will be
directly identified in the complex plane. A mobile node is represented by a fixed symbol with definite
spatial coordinates in the complex plane which has a total of 8 symbols in the outer ring. Hence 8
symbols will represent 8 users in the complex plane.
We use circular 8PSK/ QPSK with two concentric circles; the outer circle having 8 symbols on 8PSK and
the inner circle having 4 symbols on QPSK There will NOT be a dedicated channel for carrying the
signalling information. The main Channel is subdivided in multiple channels, each of which will have 8
symbols per frequency band for addressing the user and 4 symbols for user data. The rate of transfer of
the symbols in the outer circle will pertain to the call attempt rate, while the rate of transfer of the
symbols in the inner circle will pertain to the actual traffic data rate.
We propose a smart multiple access topology which will be able to perform specific layer 5 and 7
processes related to addressing and identification of a node in the RAN, right at the physical layer. After
the addressing part is accomplished, and the data channel (say a time slot for the traffic conveyance) is
identified, the data communication for the supplementary services will follow the conventional
methodology of a GSM/UMTS /LTE network.
24 Smart Mobile Network Access
Topology
3
Smart Mobile Network Access topology
2.8. Introduction
In this chapter, we present the basic philosophy of the proposed smart access network technology [2] and
how it fits within given boundaries of the core network topology. We will discuss in details how the
symbols are used to convey information for the purpose of addressing and also the user traffic. The basic
addressing mechanism is described, the high level call flows are discussed and then the internal
architecture of the mobile station is presented.
As we highlight the details of the timing frame structure and the associated calculations, we will also
present the Simulink simulation model to validate the concept of physical layer addressing. In the
subsequent section, we focus on the type of the mobile network, say whether a Personal Communication
System (PCS) network, or a closed user type of network, or a Global Mobile Network. We mainly discuss
the modulation scheme, the timing diagrams and high level schematic of the mobile device w.r.t each
network implementation. In a small scale closed user type of network, it will be possible for node to node
communication without the involvement of any intelligent core network equipment. In this chapter we
mainly focus on closed user networks and small scale mobile networks categorized under Personal
Communication System. The primary components which comprise the network are discussed. In this
chapter we coin a new Network element called the coordination processor which is an analogue of Mobile
Switching Centre of 2G/3G network, CSCF for an IMS network or MME (Mobility Management Entity)
for a LTE network.
1) It actuates layer 5 and 7 processes related to addressing and identification of a node in the RAN, right
at the physical layer [1][13]. Each node is assigned a fixed symbol coordinate in the physical plane, a
time slot in the time frame and a physical channel. The symbol pertaining to the specific time slot is
used to address a user. After the addressing part is accomplished, the time slot is seized for traffic
data conveyance.
2) The time/space switching matrix of a 2G network, CSCF (Call Session Control Function) of IMS
network [10][23], MME (Mobility Management Entity) of LTE Networks [24] is substituted by a
Network Element termed as coordination processor. It is responsible for the addressing and mobility
management functionalities employing the physical layer. It also takes care of some Layer 7
25 Smart Mobile Network Access
Topology
functionalities that are still required for AAA (Authentication, Authorisation and Accounting),
supplementary services and Value Added Services. The access layer also has reduced addressing and
mobility management functionalities, and hence requires less intelligent devices which otherwise
would have required to support extensive signaling inter operations.
3) The RAN (Radio Access Network) will comprise of ad hoc repeaters, referred to as Access Points in
the network area. They reside at the same network hierarchy level as the coordination processor of the
core network. Unlike BSS (Base Station System) of RAN in GSM/UMTS, where the access network
devices are identified by specific global addresses (in E.212 or E.164 Numbering plan format), the ad
hoc repeaters in purview of the smart network topology will not have any specific network addresses
except the Geographical Information System (GIS) addresses.
The detailed description of the multiple access technology and the frame structures is as follows.
We assume a TDMA/FDD multiple access. The available bandwidth is divided in multiple sub frequency
bands. Alike GSM, the frequency sub bands are called AFCRNs (Absolute Radio Frequency Channel
Number). The AFCRNs are numbered in numerical order. The number of AFCRNs depends on the
bandwidth that is required for the mobile network. Each AFCRN is linked to one Time Frame. Fig. 3
shows one TDMA frame, which includes 1 time slots (numbered from 0 to ). The data rate
required for the traffic burst is denoted by fd. fp denotes the sampling rates of the time slots before it is
used to convey the traffic data. fr denotes the refresh frequency for the given frame and
fd >> fp >> fr
The modulation scheme implemented is a blend of M1 PSK (for outer ring) and M2 PSK (for inner ring),
where M1>M2. Fig. 4 shows the proposed constellation in the case of M1=8 and M2=4. The
constellation diagram in Fig.2 pertains to a specific time slot, T1, of the frame. The frame corresponds to
a specific AFCRN. Symbols of the outer ring are conveyed at a rate of fr and the symbols of the inner ring
are exchanged at a much higher rate, fd
In particular, we could set fd = 8x fr.The inner ring comprises of M2 symbols for user traffic, and the outer
ring comprises of M1 symbols that will be used for the purpose of addressing the users. In the proposed
multiple access scheme, a user is identified in the network with respect to the symbol coordinate in the
complex plane. The 8PSK symbols are continuously rotated with 3π/8 radians per symbol. The rotated
symbols are defined in equation 1.
There is no separate time slot for conveying the control signaling and the data part. A single time slot can
carry M1 symbols, used for addressing M1 users and later, the same time slot will be used to convey the
symbols for data traffic employing M2 symbols of the inner ring of the complex plane.
26 Smart Mobile Network Access
Topology
Therefore, M1 users, which have been allocated M1 different symbols of the outer ring could use the
same time slot and frequency sub-bands.
010
000 011
User plane addressing
Data plane
symbols
001
111
101
110
100
Therefore, even if a primary frequency is allocated to a given user, it may happen that the particular
frequency is in use by another user which has been assigned the same time slot and frequency, but a
different symbol in the complex plane.
27 Smart Mobile Network Access
Topology
1) The action to be undertaken when in a given frequency sub-band, the assigned time slot is already in
use by one of the other M1 users, characterized by different symbol coordinate.
2) How the frequency sub-band, the time slot and symbol coordinate for addressing the user in the
network are assigned to the user during the provisioning process.
These two points will be explained in the following two paragraphs 3.3 and 3.4.
The AFCRN scanning algorithms are programmed within the user equipment, as well as the Coordination
processor of the network (discussed in the subsequent section).
If in a given frequency sub-band, the assigned time slot is already in use by one of the other M1 users,
characterized by different symbol coordinate, the Mobile Station (MS) or the network may allocate
dynamically another primary frequency from a different frequency band to that user. Fig. 2 shows the
processes involved for channel acquisition [8][11].
The network will apply any one of the sequence for paging the MS at random. The target MS listens to
the time slot and the particular symbol assigned to itself in all the frequencies. So it is not important
which sequence is followed to find the first frequency in which the specific timeslot pertaining to the
target mobile is free.
The handset and the network uses proactive channel scan algorithms mainly based on one of the
following schemes chosen device.
• Alternate Even
• Alternate Odd
• LRU (Least Recently Used)
• Most Idle
• Round Robin Clockwise
• Round Robin Counter Clockwise
• Sequential Bottom Up
• Sequential Top Down
This implies that if a user has initiated a call towards one of the M1 users pertaining to different symbols
in the same time slot which is already busy due to use by another user, then the MS or Network
(according to the direction of the call) will hunt for that particular time slot in the next frequency band
according to the scanning algorithm until it finds one.
28 Smart Mobile Network Access
Topology
Figure 5: Sequence of the processes to hunt for AFCRN and seize the time slot for data transport
During a mobile terminating call, the network can apply any one of the scan sequences as in Fig 3 to find
an unused AFCRN for paging the MS at random. The target MS listens to the time slot and the particular
symbol assigned to itself in all the 15 frequencies. Just alike LTE/UMTS, the scanning algorithms should
be handpicked by the device modem manufacturer. The frequency scan also considers the strongest pilot
based on parameters like RSSI (Received Signal Strength Indicator). There is no specification as such
defining these scanning algorithms, and they are proprietary to the chipset vendors, like Qualcomm.
Hence, in this study we will not focus on the technicalities of the frequency scanning algorithm and how
it can be rendered in the hardware as a firmware.
29 Smart Mobile Network Access
Topology
Hence it can be inferred that if a user has initiated a call towards one of the M1 users pertaining to
different symbols in the same time slot which is already busy by another user, then the MS or Network
(according to the direction of the call) will hunt for that particular time slot in the next available frequency
bands according to the scanning algorithm until it finds one. The MS to be paged at the other end (by the
network) acts as a silent listener and scans for the specific symbol coordinate and time that has been
allocated to itself to search for a page signal.
In comparison, the frequency and cell scan process for UMTS/LTE is described below at high level.
When UE boots first time in a radio network it doesn't have any information of the AFCRN. It has a
default search mechanism for the AFCRNs. The UE shall scan all RF channels in the available bands to
find a suitable cell. The UE searches for the cell with the strongest pilot frequency.
After the first time successful network attach had happened, the USIM (Universal Subscriber Interface
Module) stores the cell information as well as the carrier frequency.
During the next time when the UE tries a cell selection, it uses the stored information of carrier
frequencies and optionally also information on cell parameters, from previously received measurement
control information elements or from previously detected cells. Once the UE has found a suitable cell the
UE shall select it. If no suitable cell is found the Initial Cell Selection procedure shall start. The UE
measures the RSSI (Received Signal Strength Indicator) for each channel, and creates a list of each
channel numbers with the measured RSSI.
30 Smart Mobile Network Access
Topology
Due to the fact that we have layer 1 addressing, the system needs to formulate directly the layer 1 related
parameters assigned to the handset right from the node address. As discussed earlier that for a global
roaming network which is the scope of this paper, this address will be an E.212 address or IMSI. The
mobile station will have the necessary algorithm to generate the layer 1 parameters from its own IMSI
from the given logic as discussed in the following section. This is required when the mobile station
attempts to originate a call.
Similarly during a terminating call scenario, the coordination processor at the core network will also be
able to derive the Layer 1 parameters (which are the symbol coordinate of the user, time slot and the
primary frequency number) and generate a page message for the B number for the termination leg. The
methodology indicating the procedure to derive the layer 1 parameters from the address of the user is
provided below.
Say, there are a total of n time slots in the TDM frame per channel (frequency sub band). Let there be m
frequency bands. Let us assume that 8 users exist per time slot. So the total number of users that can
provisioned / defined are: m x n x 8
We could reserve:
• 1 digit for number of users per time slot, the range of value can be 1 to 8.
• 4 digits for max number of time slots per frame
• 3 digits for number of sub bands, each band for one time frame.
• 2 digits (dynamic) used to depict the frequency difference, always on the positive side. The
generation of the last 2 digits is dependent on the leg of the call.
Address of the node =| 5 digits for n |1 digits for symbol |3 digits for m |
Hence when a mobile node attempts to set up a call to another node, it checks the number and interprets
the Time Slot (TS), symbol number and also the associated frequency with which it invokes a layer 7
message towards the network. In case the particular time slot in the frequency band is busy for a user
represented by another symbol in the same time slot, the frequency scanning commences as per the
schemes in Fig 3.
31 Smart Mobile Network Access
Topology
All the existing access technologies for mobile networks have a fixed spectrum bandwidth requirement.
Even for a network that is smaller in size with a lesser customer base, they still need to invest in the same
minimum spectrum bandwidth.
With our smart network approach, the bandwidth requirement of the physical layer is directly dependent
call attempts made in a network. Hence it is directly dependent on the customer base size. So smaller
networks will be able to optimize the spectrum requirement accordingly, which is seemingly difficult with
all the existing technologies. This is discussed in the following section.
The number of time slots in the TDM frame (pertaining to a frequency sub band) and the scanning
frequency of the time frame primarily depends on the factors below.
1. Call attempts per second of the network and the data rate offered per time slot when the time slot is
used for traffic for a particular user.
2. It also depends on the maximum number of users that the network can address at a given point of
time.
Initially, a time slot in a time frame (for a specific AFCRN) is used for addressing a mobile node. Let the
time slot be denoted by ‘ ’.
Let us denote with ‘ the data burst for user traffic
‘ ’ is sub divided in multiple time slots (8 time slots) for data transfer.
Let ‘ ’ be the time duration of the time frame pertaining to a AFCRN allotted for a mobile user.
Hence,
≫ >>
Let us say there are ‘m’ frequency bands (AFCRN)
So the Total available time slots are =
Say is the time required per frame.
=1 /
call attempts can be made in tr time period
(where = time gap between 2 TDM bursts for a given time slot for data transfer)
32 Smart Mobile Network Access
Topology
(n-1)/n≈1, so =
Let be the maximum time gap allowed between 2 consecutive TDM bursts for carrying the data
for a given user.
Let there be k number of time slots for the data transfer within the time slot allocated for addressing
So, =kx
to makes one frame. Let us say there are ‘m’ frequency bands
So the total available time slots are = . Say is the time required per frame
= 1/
The total bandwidth required for the network will be dependent on the Busy Hour Call Attempt
encountered by the network. As the physical layer is directly involved in identifying and addressing the
user, hence the total bandwidth required per network will depend on the number of simultaneous users
making or breaking calls in the network.
As the addressing and mobility management has much less dependence on layer 7, the total bandwidth
requirement and the number of sub frequency bands realized does not have a strict boundary unlike GSM
which is defined in the specifications. This flexibility is a conceivable advantage compared to state-of-
the-art networks which require fixed spectrum bandwidth allocation for operations.
The values which are proposed for the parameters used in Equation 3 through Equation 5, for a mid-sized
network with no frequency reuse (one cell architecture) are as follows. The values are proposed according
to the GSM 5.05x specifications in an attempt to keep the same frame duration and structure.
33 Smart Mobile Network Access
Topology
= 1 symbol @ rate of 270833 symbols/sec and 3.692 µs duration for voice /data. The symbols pertain
to the inner circle of the constellation diagram.
Hence = 1/ = 1/3.7 µs
Number of AFCRNs for the Location Area (there is only one big cell) = 124.
The call flow in Fig 8 demonstrates how mobile stations can establish semi-permanent connection
between themselves.
34 Smart Mobile Network Access
Topology
Figure 8: Handshake process between the mobile Nodes for Call Establishment
The above algorithm can be implemented in the Mobile Station as a firmware. The complexity of
implementation of such algorithm in the mobile station and the penalization/impact on battery and
processing power are discussed further.
Generation of time slot and symbol coordinate: The algorithm to generate the time slot and symbol
coordinate from the dialed number during a call attempt is not intricate. A simple function can be defined
which can be implemented as a subroutine in the main program. This algorithm should not consume
significant processing and battery power.
Time Slot/Frequency scan/symbol coordinate: The time slot and frequency scanning is at present a part
of mobile nodes. The scan algorithms are specific to modem device manufacturer. The additional
35 Smart Mobile Network Access
Topology
complexity is to scan for the specific symbol coordinate which acts like a page symbol. In the traditional
approach this happens via layer 5/7 layer process which involves more processing resources.
The descriptions of the processes as shown in the Fig. 9 are as follows. The processes 5 & 6 are
related to the terminating leg of the call and will be invoked in the B Party Node. The rest of the
processes (as in the diagram) are invoked in the Call Initiator, which is A Party.
Leg 1: The Called party number is input at the keypad. The numbers are fed to the section which
analyses the Called number and results out the following parameters.
• Symbol
• Time Slot
• Frequency Band (from which the frequency scan will start to initiate handshake with Node B)
Leg 2: The three parameters are fed to the frequency scanner. The scanner sequentially scans the time slot
in all the frequency sub bands available and determines which one is free. The time slot in the frequency
band might be busy for data transfer amongst other Mobile nodes where the B party number has the same
TS assigned but a different Phase (symbol). The frequency band information arriving from the previous
block is used for commencing the frequency scan.
Leg 3: The TDM Mux synthesizes a TDM frame where the symbol is fed to the time slot.
Leg 4: The symbol in the specific time slot associated with the frequency band is transmitted on the air
over the forward channel.
Leg 5: The Frequency / TS scanner scans the specific time slot allocated for itself, in all the frequency
bands. It checks whether there is any symbol transmitted on that time slot in any bands. When it finds
one, it interprets this as a page signal.
Leg 6: It formulates a similar TDM frame inputting the symbol in the same time slot (which is assigned
for itself) and in the corresponding frequency band in the reverse channel.
Leg 7 & 8 & 9: The symbol is received and the TS and frequency band registered @ node A for data
communication. It passes on this information to the coordination processor which interfaces with the
QPSK modem to start full duplex voice communication using the registered time slot and the frequency
band.
The above processes (7,8,9) are followed in mobile node B for seizing the Time slot in the frequency
band for full duplex voice communication with B.
At a high level the following flowchart shows the Network Acquisition process between 2 mobile nodes
in Fig 10.
37 Smart Mobile Network Access
Topology
Figure 10: Algorithm for seizing a time slot for establishing traffic channel
38 Smart Mobile Network Access
Topology
As mentioned above, in this simulation, we focus only on the outer circle where the rate of symbol
generation is not high. Hence BER calculation is not our focus for the time being. So we assume a generic
AWGN channel in between the transmitter and receiver. But in latter section, we delve in radio network
specific channel impairment scenarios when we discuss about coding in chapter 4. To summarise, the
simulation is an attempt to establish that physical layer can be in fact directly linked to addressing (and
hence indirectly linked to mobility management) which are otherwise higher layer functionalities in the
State-of-the-Art network.
The inner ring is used for conveying the symbols for the given user, specific to the time slot. The symbol
rate corresponds to the data speed required by the user. In the following simulation model, we attempt to
portray this concept where the the simulation represents only the outer ring meant for addressing. To keep
the simulation simple, we have considered 4 users instead of 8 users. Each user is represented by 2
symbols for the purpose of redundancy.
In the model in Fig 14, we have 4 transmitters, and 4 receivers. Each transmitter transmits the symbols
pertaining to specific coordinates on the complex plane. As there are 4 transmitters, hence the symbols
have 4 coordinate sets, as can be seen in Fig 14, which represents the symbol output from the 4
transmitters. As said previously, we take 2 symbols per user for the purpose of redundancy, which can be
seen the graphical output (in Fig 13.).
Each transmitter injects the symbols is specific Time Slots. Hence, we multiplex the time slots, carrying
symbols of each users. This is demultiplexed at the other end by individual receivers. The receivers are
designed to detect the information in specific time slot and specific symbol. For clarity, we will zoom the
Transmitter and the Receiver part in Fig 11 and in Fig 12 respectively.
In Fig 11, we have a random integer generating the symbols at a periodicity. The random integer is fed to
a data mapper, which maps only specific integers to fix the number of symbols per user. The TDM
Multiplexer feeds the signal for multiple users over a Additive White Gaussian Noise (AWGN) Channel
towards the receiver.
39 Smart Mobile Network Access
Topology
According to the Figure 12, the receiver looks for specific symbols, for instance 3, 4 for the first
transmitter module. Each receiver has a demultiplexer. The Demultiplexer at each receiver extracts the
symbol/s meant for the specific time slot allocated for receiving the addressing information .The receiver
node extracts the symbols only from the time slot allocated for the node. The 2 comparison blocks in Fig.
12 matches the symbols and if it finds the paging symbol allocated to the specific receiver, hence it
outputs the symbol to the display.
Figure 12: Receiver: Retrieval of the address symbols for a single user
40 Smart Mobile Network Access
Topology
We have 4 scatter plots (Figure 10) taken for the 4 users, where it is seen that the symbols specific to the
user (2 per user in this case) is correctly received at the receiver end. In Figure 10, we are assuming an
AWGN channel for the sake of simplicity. The effects due to the impairments in the physical channel at
the radio network and the procedure of correction are defined in details in Chapter 4.
Figure 14 shows the complete model showing how the symbols are transmitted from the transmitter and
then the symbols are multiplexed. The symbols for each user is displayed in each coordinate. The symbols
are fed to the Demultiplexers at the 4 receivers. Each receiver has a demultiplexer to extract only the time
slot allocated to the particular receiver and then feed the symbol to the next block for symbol detection.
41 Smart Mobile Network Access
Topology
Figure 14: The simulation for 4 transmitters and 4 receivers system to portray the addressing mechanism
using the physical layer addressing
42 Smart Mobile Network Access
Topology
The choice of the duration of the guard band solely depends on propagation delay caused due to increased
distance between the mobile node and the access point.
For a typical GSM system, the slot lasts 577 µs, which poses a limit on the range of 35 Kms.
If the range exceeds the threshold, the propagation delay becomes large compared to the slot duration and
the mobile loses its time slot.
Tp => time slot for the main frame for addressing and identifying the user
Td => time slot for data
For the Tp , the system allocates a guard band only if 2 adjacent time slots carry one of the 8 PSK
symbols of the outer ring meant for addressing and identifying the user. Or else the Guard band is
provided if a Tp is used for voice channel (after addressing function is completed).
That is, if we see Td data bursts within Tp 1 and an adjacent Time slot Tp 2 (say), also carrying traffic
information or the symbol for addressing, the guard bands will be placed between them (refer Fig 15)
Figure 15: Guard band between two adjacent time slots used for data traffic
The Guard band is also placed between 2 frames to demark the different frames and avoid overlap. The
guard band used to distinguish the frames is twice the length of the guard band used for the time slot Tp.
43 Smart Mobile Network Access
Topology
This chapter covers the topic of Closed User Group Network and Small sized network. Next chapter
covers the technicalities of the global roaming network.
As discussed in section 2.2, the Mobile Node is identified in the network by an address following E.164
Numbering Plan. The basis of allocating an address for a mobile user however is dependent on the
parameters that are directly related to the network implementation. For example, the principle varies from
a Closed User Group network to a Global Mobile Network. The address allocation principle for a Closed
User Group network is defined in section 2.2.
Depending on the size of the network, the number of addresses for the mobile node (according to
subscriber population), number of channels and also the time slots per frame will change. So the length of
the number (for the Mobile Node address) can be variable and so can be the three fields within that
constitute the number (Symbol Number, Time Slot, AFCRN).
The various processes taking place internally in a mobile station starting from the point when the number
is dialled and the channel is acquired for the call seizure is shown in Figure 16.
44 Smart Mobile Network Access
Topology
Figure 16: High level representation of frame formation after the destination number is dialed.
For a mobile network, there should not be any restriction for the number of subscribers that it can serve.
The subscriber should be able to choose / change his number. Especially in the light of Number
Portability, there should be no restriction to the address pattern, as the node address can actually belong to
another network. Hence, the Identification number for a customer should be a E.212 address, instead of
E.164. The E.164 address gets associated to the E.212 address in the HSS (Home Subscription System) or
HLR (Home Location Register) in the core network, as is seen in the present mobile networks.
The high level components of the small sized mobile network are depicted in Figure 17.The RAN mainly
comprise of the access points , which are repeaters which aggregate the forward and the reverse channel
information to the Coordination processor , which is partly sitting on the RAN and partly at the CN. The
Coordination processor is integrated with various core network elements, which are network adjuncts like
HLR, SMSC and the Intelligent Network. So there is no major change in the core network elements and
the signalling can still continue on the existing SS7 protocol, based on MAP and CAMEL / INAP etc. It
45 Smart Mobile Network Access
Topology
needs to be noted here that no signalling information is exchanged for the mobility management part. The
signalling is mainly for AAA, tele-services, supplementary-services and value added services.
Access point
SMSC
HLR
f1
f2
Access point
IN/
CAMEL
Access point
The coordination processor is the heart of the entire network. It first aggregates the timeslots of a frame
and constructs the frame in the reverse direction. After this, it analyses the time slots in the frame. It
checks the coordinate of the time slot and then the symbol, the frequency and the frequency difference
(last 2 digits) to derive the A party number for a particular time slot. At this point of time the B party
number is not yet known. Hence it depends on the signaling level intelligence to obtain this information.
Before it formulates and relays this symbol in the specific time slot (for the B Party) as it arrives, it
checks in the AAA system to authenticate and authorize the A party customer.
For the frame formation in the downlink, the last 2 dynamic digits are not used, as no further digit
analysis required at the network level.
The B party responds to the page message, after which the A party information and the other parameters
arrive at the B party to initiate a ring signal.
The Access points are also referred as Time Slot grabbers. In a location area, it receives the call attempts
made by the Mobile stations in vicinity. This means, it looks for information arriving at specific timeslots.
The information is mainly the symbol depicting a called user. From the different users the timeslot
obtained are aggregated by a Mux before the coordination processors. If a timeslot is already busy in the
pre call establishment activities, the coordination processor discards a second call request in the same
timeslot towards the same or different user depending upon the symbol information.
46 Smart Mobile Network Access
Topology
As in figure 18, there can be several Multiplexers before the coordination processor. But just before the
coordination processor, there is an intelligent central multiplexer which aggregates all the time slots, and
formulates the frames to be further processed by the coordination processor.
Fig19. Illustrates how the frame is formed in the uplink for the addressing part. Multiple User Equipments
(mobile devices) as in this diagram invoke call requests. The UE (User Equipment) first hunts for an
available AFCRN where the time slot in the allocated position (as assigned to the user during the
provisioning process) is identified. The symbol is then populated in the time slot and the UE generates a
time frame by injecting only the specific symbol in that time slot in the time frame. Other time slots in the
time frame are empty (as in Fig.19). The time frame pertaining to the available AFCRN is marked in
black in Fig.19 which implies that the User Equipment has successfully populated the assigned symbol
(assigned to itself) in the time slot predefined for the User.The Access point transfers the information to
the local Multiplexer which aggregates the symbols ingressing from the User Equipments and formulates
a single time frame for each AFCRN .The Local Multiplexer formulates a time frame by injecting the
symbols from the different users in the appropriate slots as per the time frames arriving from the User
Equipment. This time frame is transported to the Aggregate Multiplexer. The Aggregate Multiplexer
synthesizes an aggregate time frame w.r.t each AFCRNs and forwards it to the Coordination Processor for
analysis and call processing.
At this stage, it is impossible to identify the address of A party (calling number of a particular user) from
the symbol coordinate and timeslot, because the AFCRN is variable. Hence the Coordination processor
cannot commence authentication. It first needs to secure the Time slot in both Uplink/Downlink
47 Smart Mobile Network Access
Topology
directions between the MS and itself. Hence it generates a response message in downlink towards the MS
using the same AFCRN number that was used by the A party in the during the uplink layer 1 message for
call initiation. However, the particular AFCRN may not be available because it may already be in use as
traffic channel by other users. In this case, the Coordination Processor does not generate the response
message towards the Mobile Station. The MS waits for the timer expiry (in milliseconds) and restarts the
scan process and re-initiates a new message with another available AFCRN. In this process, it skips the
AFCRN that was previously determined as unavailable.
Following a successful layer 1 handshake between UE and the Coordination Processor, the Time Slot
pertaining to the AFCRN is used further as traffic channel. The UE generates a layer 7 message towards
the Coordination Processor encapsulated in the time slot that was allocated following the layer 1
handshake process as described earlier. The data conveyance materialises following M2 PSK modulation
based on the inner ring of the constellation diagram. UE populates A party addresses (calling address in
E.212 format), authentication parameters, dialled numbers, supplementary service information in this
message, so that the Coordination Processor can liaise with the HSS/HLR to actuate authentication,
authorisation for A party. Subsequently, it analyses the B Party (dialled) number and figures out the
outgoing channel by carrying out dialled digit analysis.
The above process deviates from mobile originating call procedure followed by the State-of-the-Art
Mobile Networks. Generally in conventional networks, the Serving MSC/MME/CSCF [10][23][24]
generates a ISUP/SIP message directly for call termination towards the B party address. There is no
interrogation towards the HLR//HSS. Only in case of Home routing scenarios, the call is routed towards
the Home network where the SCP (Service Control point) is queried to generate a ‘Connect To’ number.
Subsequently, the Coordination Processor injects the symbol of B party in Time slot (preconfigured for B
Number) in the time frame for the particular AFCRN in the downlink. In case the primary AFCRN is
busy, then alternative AFCRNs are tried according to the predefined frequency scanning schemes. Note
that this time frame also carries the symbols from other users in the respective time slots. Aggregate
frame is formed and is routed to the aggregate multiplexer. The aggregate multiplexer broadcasts the time
frames pertaining to all the AFCRNs in the Downlink via the Local Multiplexer and Access Points. B
party scans the AFCRNs and looks out for the specific symbol contained in the specific time slot assigned
for B number. If it finds one, then it formulates a response message by injecting the same symbol in the
same time slot position in the UL. If the time slot (pertaining to the AFCRN) is busy, there is no response
back from B party. The Coordination processor has a time out and tries to page B party again with an
alternate AFCRN according to the frequency scanning logic. As AFCRN is not fixed we cannot
ascertain at this stage seeing the radio layer physical layer message whether the page message in intended
for the particular B party address or some other users. The page message can indeed be meant for another
user provisioned with the same symbol coordinate and time slot position. Hence, multiple users can
simultaneously try to generate the response message. But once the coordination processor receives the
layer 1 page response, the time slot related to the AFCRN will be reserved for use by the coordination
48 Smart Mobile Network Access
Topology
processor. The time slot / AFCRN is also reserved at the UE end.. The subsequent layer 7 message
generated by the Coordination processor will bear the B party address (E.212) as well as the A Party
address (E.164 for the CLI) and the supplementary service information. The specific UE (the original B
party) will respond to this layer 7 message. The other UEs which reserved the Time slot will release it
when it ascertains form the layer 7 message carried by the Time Slot that the page was intended for
another user (ie the B party).This completes the addressing process in the downlink.
Figure 19: Aggregate Frame Formation in the Uplink and user (A Number) identification by Coordination
Processor
49 Smart Mobile Network Access
Topology
The timing synchronisation pulse will be generated by the coordination processor which in turn is
synchronised with the atomic clock. The AP (Access Point) sends signals to enable the MS to
synchronize itself to the AP and if necessary correct its frequency standard to be in line with that of
the AP. The signals sent by the BTS for these purposes are:
The timings of timeslots, TDMA frames, are all related to a common set of counters which run
continuously whether the MS and AP are transmitting or not. Thus, once the MS has determined the
correct setting of these counters, all its processes are synchronized to the current serving AP. The MS
times its transmissions to the AP in line with those received from the AP. The BTS sends to each MS
a "timing advance" parameter (TA) according to the perceived round trip propagation delay AP-MS-
AP. The MS advances its timing by this amount, with the result that signals from different MS's
arriving at the BTS and compensated for propagation delay. This process is called "adaptive frame
alignment".
Delay tracking
The AP shall thereafter continuously monitor the delay of the normal bursts sent by from the MS. If
the delay changes by more than one symbol period, the timing advance shall be advanced or retarded
1 and the new value signalled to the MS.
MS carrier frequency
The MS carrier frequency shall be accurate to within 0.1 ppm, or accurate to within 0.1 ppm
compared to signals received from the AP. These signals will have an apparent frequency error due to
BTS frequency error and Doppler shift. The MS shall use the same frequency source for both RF
frequency generation and clocking the timebase.
Internal timebase
The MS shall keep its internal timebase in line with that of signals received from the AP. If the MS
determines that the timing difference exceeds a set time duration in seconds, it shall adjust its
timebase in steps .
Timing of transmission
The MS shall time its transmissions to the BTS according to signals received from the AP. The MS
transmissions to the BTS, measured at the MS antenna, shall be 3 timeslots-TA behind the
transmissions received from the BTS, where TA is the last timing advance received from the current
serving BTS. The tolerance on these timings shall be ± 1 symbol period.
A dedicated timeslot is assigned for frame synchronisation, as represented by FS in Fig 21. This slot is
followed by the Subframe ID (SFID) which is subsequently followed by data packets. The frame
synchronizer recognizes this pattern and aligns the data into Minor Frames or Sub Frames [ref Fig
21].
FS SFID1 D1 D2 D3 D4 D5 D6 D7 D8
FS SFID2 D1 D2 D3 D4 D5 D6 D7 D8
FS SFID3 D1 D2 D3 D4 D5 D6 D7 D8
FS SFID4 D1 D2 D3 D4 D5 D6 D7 D8
FS SFID5 D1 D2 D3 D4 D5 D6 D7 D8
As discussed in the above sections, we have an understanding how the Coordination Processor takes
part in frame formation related functionalities. In this section, we will be focussing more on the
internal processes and functionalities of the coordination processor. The coordination processor sits
between the access and the core network. It replaces the functionality of a modern day space and time
switch of a mobile network.
The various functionalities of a coordination processor are listed below.
1. Deriving the addressing related intelligence of the destination node from the reverse channel.
2. Populating the information (symbol) in the time slots and frame formation in the forward channel.
3. Interaction with the core network for AAA.
4. Processing the signalling information arriving at the forward channel and formulation of the
signalling information in the reverse channel.
5. Functionalities related to the supplementary services for the users.
6. Billing / CDR related processes.
7. Various other OSS/BSS related functionalities.
8. SS7 signalling and PCM Trunks with external legacy network.
The primary functionality of the coordination processor as explained above, and its interworking with
the different functional components are shown in Fig 22.
The high level architecture of the coordination processor is shown below, which is self-
explanatory:
The functional components in the coordination processor related to frame formation in the forward
and reverse channels are detailed in the process flow as per Fig 23.
The functional components in the coordination processor related to dialled number analysis and
determination of the output route is provided in Fig 24. The Coordination processor identifies the type
of call based on the dialled digits and accordingly selects the appropriate route to transit the message.
The coordination processor routes a call after digit translation through the appropriate route that is
defined for the dialled number.
Fig 24 identifies the different call types processed by the coordination processor. All these processes
require digit analysis and translation. After formulating the desired digit set (in case of group calls or
call conferencing) the Coordination processor actuates the formation of the time frame following digit
collection for all the bi directional call attempts.
54 Smart Mobile Network Access
Topology
As defined previously in section 2.2, Fig 3, the TDMA frame comprise of 2 main time slots.
The tp time slots arrive in bursts. The arrival gap depends on the size of the time frame.At the access
point, the TDMA frames on all of the radio frequency channels in the downlink shall be aligned. The
same shall apply to the uplink. At the access point, the start of a TDMA burst for traffic channel
(represented by Td) on the downlink is delayed by the fixed period of 3 timeslots from the start of the
TDMA frame on the uplink. This is shown in Figure 25. The data traffic part is handled by the QPSK
55 Smart Mobile Network Access
Topology
of the inner ring of the constellation diagram. The time slot duration for the data traffic is 8 times less
than the one which is involved for node addressing.
At the mobile station this delay will be variable to allow adjustment for signal propagation delay. The
process of adjusting this advance is known as adaptive frame alignment The staggering of TDMA
frames used in the downlink and uplink is in order to allow the same timeslot number to be used in the
downlink and uplink whilst avoiding the requirement for the mobile station to transmit and receive
simultaneously. The period includes time for adaptive frame alignment, transceiver tuning and
receive/transmit switching.
The timings of timeslots, TDMA frames, the rotation of time groups are all related to a common set of
counters which run continuously whether the MS and Access Point (AP) are transmitting or not. Thus,
once the MS has determined the correct setting of these counters, all its processes are synchronized to
the AP.
The MS times its transmissions to the AP in line with those received from the AP. The AP sends to
each MS a "timing advance" parameter (TA) according to the perceived round trip propagation delay
AP-MS-AP. The MS advances its timing by this amount, with the result that signals from different
MS's arriving at the AP and compensated for propagation delay. This process is called "adaptive
frame alignment".
Figure 26: End2End call flow between 2 mobile devices actuated by the Coordination Processor
The number of channels must be related to the number of carriers (frequencies) available:
In particular the parameters that the applicable in the Location Area are:
• Mean call holding time of 90 s implies the average traffic per subscriber is 25 mE
• Using Erlang B tables for GoS = 0.01 and n = 124 x 8 =992 channels, gives 666.589 E =
666589 mE.
• Number of subscribers that can be supported is: 666589 / 25 =26663.56.
• The maximum range of a cell is 35 Kms. This is because the Timing Advance parameter is set
to 63.
57 Smart Mobile Network Access
Topology
We keep the TA parameter used in GSM to make sure that the width of the time slot stays at 577 µs.
This is done to make sure that the same error codes (convolution/fire/block) which are used for GSM,
that are tried and tested over the years are reused in the present proposal.
Number of Access points helps in boosting the signal strength (acting as repeater) but does not
participate in forming a cell. Hence this factor does not affect the spectral efficiency. But it affects the
distance between the antennas of the access point and the mobile station. One of the shortcomings of
the proposed mechanism is the network scalability. These types of networks can be functional for
small MVNOs, University campuses/ factories/ cruise ship etc. In the next chapter we set out
architecture with smart location management scheme for global roaming network.
58 Smart Mobile Network Access
Topology
4
Deploying the Novel Multiple Access Scheme for a Global
Mobile Roaming Network
3.0. Introduction
The state-of-the-art mobile network has rooms for improvisations especially in the domain of mobility and addressing.
With all the evolving technologies, we primarily see two trends [10][23][24].
But mobility and addressing in the state-of-the-art has virtually no deviation from the legacy schemes.
In this chapter we discuss the processes to implement our novel multiple access topology for a global roaming network
and introduce unique mobility management scheme.
First we focus on the proposed mobile network architecture and discuss its alignment and compatibility with the proposed
multiple access scheme. The higher layer processes encompassing mobility and location management and addressing are
discussed. We discuss the novel process of mobility management which is driven more by the mobile station. Further,we
discuss the checker board approach based cell design and elaborate the handover process.In Fig 27, we take the example
of Belgium, were we attempt to allocate square shaped cells according. Note that this depiction is only for the purpose of
exemplification. The allocation of the cells in the Location Area (ie. Belgium) may not be the actual implementation that
will be followed for deployment. It is just an example.
Figure 27: Network area of Belgium segmentised in large sized square shaped cells
59 Smart Mobile Network Access
Topology
In this chapter, we compare with the present day mobile technologies and also highlight the primary advantages of the
proposed novel mobile roaming network over the prevailing technologies.
In a present GSM / UMTS network, substantial bandwidth resource is consumed due to signalling. Also the complexity in
the application level processes need to be considered, as MM and RRM are layer 7 activities. This is even true for the
state-of-the-art 4G (LTE) networks, where eNodeB [24] in conjunction with MME is responsible for MM.
We thrive to handle frequency allocation and reuse though a process which is more driven by the intelligence in the
handset and the physical layer.
Or there may be a central system with virtual coordination processors taking care of each cell.
Figure 27, demonstrates the architecture and cell allocation pattern for the access network [1]. It also describes the
handover functionality to be incorporated in the proposed network and focuses on the control logic in the Mobile Station
for initiating handover.
The entire network area can be represented as chess board. Each block represents a square shaped cell. The cells do not
have any cell ID. So the network is agnostic to the exact location of the mobile station. The white blocks are allocated
AFCRNs from 1 to 64, while the black ones are allocated AFCRNs from 65 to 124.
Each mobile station is fitted with two transceivers. There is an active part, which is active in cell which serves the mobile
station. The dormant part keeps on scanning the adjacent cells and is mainly responsible for actuating the handover
procedure. It only scans the available timeslots (in its domain) in the subsequent frequency range. Hence while the active
one operates in the AFCRN domain 1 to 64, the dormant transceiver operates in the range 65-124.
A central processor in the Mobile Station monitors and compares the signal strength as perceived by the 2 transceivers,
The MS also has a inbuilt GPS unit, and if in open air (with LOS with the satellite) can also determine the direction and
speed of motion. It also has an electronic compass to analyse the direction and interpret the direction of motion if the LOS
with the satellite is not available. Analysing the signal strength of the 2 received signal (and also gathering intelligence
from the GPS / compass unit if available), the handset decides to initiate the handover,
In such a case, the passive Tr/Rcv informs the time slot and the frequency which is in use by the active Tr/Rcv. The
Coordination Processor (CP) serving the cell establishes a channel (TS) , the same value which was intimated by the
passive Tr/Rcv. This happens exactly when the active Tr/Rcv releases the channel so that the CPs of the adjacent white
60 Smart Mobile Network Access
Topology
and the black boxes can establish channel on the same TS / Freq which is currently in use between the CP of the white
Box and the MS.
Now the Physical path of the call is the Passive Tr/Rcv of the MS to CP/Access point of Black cell to CP
/Access point of the white cell which was already in conversation phase directly with the MS before the handover.
After the handover, the passive Tr/Rcv in the MS becomes the primary one, and the Tr/Rcv which was primary before
becomes dormant and starts scanning the pilot strengths of adjacent cells to check the possibilities of further handovers.
The handover never happens between the cells with the same AFCRN band that is with the same colour. The lateral
handover is performed directly between cells of opposite shades. However, the diagonal handover also happens through a
process of 2 lateral handovers. Fig. 28 demonstrates the two modes of handovers.
The algorithm to be followed by the Mobile Station to actuate and control the handover process is in Fig 29.
The complete call flow for the Handover process initiated by the Mobile Station and its interaction and handshake process
with the Coordination processor / Access Point is detailed in Fig 30.
Node B & D are
assigned different
symbols in the same Node D
Node C time slot
Node B Node A
Node A computes the Time Slot / Symbol & Frequency of the sub band allocated for
Node B and pages Node B by populating the symbol in the Time slot in the
frequency band
When Node B finds that a page message has arrived for itself, it responds back in the
reverse channel in the same frequency sub band , and in the same time slot and the
same symbol (as that of B)
Node A and B registers the Time slot and Frequency from the above handshake
process. Node A and B starts communicating on QAM with the 4 symbols of the
inner ring. The communication start at a higher refresh frequency and the details are
in a latter section
Lateral Handover: In this case the mobile station currently being served by a particular cell, moves to another cell with
the opposite shade.
The MS monitors the direction of travel (either by Compass or GPS), calculates the rate of increase/ decrease signal
strength from the 2 transceivers and then the MS chooses the right cell where handover can be initiated.
If the signal strength decreases below -75 DBm, as available from the active transceiver, the processor in the MS decides
to initiate a handover to the adjacent cell.
In case of a lateral handover, it may happen that there are multiple pilots available from the adjacent cells. Hence the MS
determines the direction of motion to derive the probability of entry in the appropriate cell, and also from the rate of
increase/ decrease of the pilots of the available passive adjacent cells.
Diagonal Handovers: Actually there will be no direct diagonal handovers as shown in Fig 28.The passive part of the
transceiver can only monitor the frequencies of the cells which have the frequencies in the adjacent block of the AFCRNs.
So handover always happens in the cell with the opposite colour.
If a MS is travelling exactly diagonally, then there will be two handovers. Initially, the handover is actuated towards the
cell of the opposite colour (of the present cell). Subsequently, the handover happens to the cell with the same colour level.
So the diagonal handover means more processing required at the Mobile station
Interesting to note is that, it is the Mobile Station which initiates the handover and not the network. The intelligence and
service logic is also intrinsic to the mobile station. The mobile station does not have any communication to the external
network, except in transferring the present Time Slot, Cell ID and Frequency information to the new cell (Coordination
processor). So the signalling related functionality / exchange, especially at the application layer is reduced to a
considerable scale.
64 Smart Mobile Network Access
Topology
The max transmit power level of the MS is around +33 dBM Watts . As the size of the cell is close to that of a present day
mobile network , hence we take +33 dBM as the maximum transmit power of, which is the standard [13].
The Max transmit power level of AP is 320 watt. All the cells in the network areas need to generate equal power level. All
the Cells should be same in dimension as well. The following figures provide a rough estimate of the power levels during
the different phase of the operation of the mobile station.
The figure 32 represents the amplitude of the MS transmission (maximum being +33 dbm) on reception of an incoming
call and the various network operations during the process.
Because of silence suppression mechanisms, there are no data transmitted during the silence period.
This implies that the sampling frequency for the timeslots carrying the symbols for addressing a node in the outer circle in
the complex plane is lower than that applicable for the inner circle of the complex plane.
Ideally could have only depended on the Busy Hour Call Attempt (BHCA) of the network.
But it is not so, as the addressing and the data traffic are on the same channel and the frequencies ( , )are interrelated.
= 1/td = 1/3.7 μs
is a single time slot carrying symbols of the outer ring on APSK. After the traffic channel is established, the shifts
to traffic mode and then starts to carry the traffic data at frequency of fd.
= 156* td
=577 µs
Considering a 26 Multi Frame arrangement, the total number of Time slot ( ) that can be realised per sub channel
frequency is 26 * 8 = 208.
Sampling
Buffering
Burst
Correction
Td 2 (second
Td1 (first burst
burst of voice
of voice data for
data for user A)
user A)
Tr 1 (Frame 1) Tr 2
Once the traffic channel is established after the addressing procedures are completed for identifying the Mobile Station in
the network, the timeslots (refer Fig 13) are used for transreceiving the symbols meant for the data traffic
corresponding to the inner ring of the constellation diagram (Fig 3). The pulses come at 4.62 millisecond intervals
(approx. 217Hz frequency), each lasting 0.57 milliseconds. This gives a mark: space ratio of 1:7, allowing up to eight calls
to be time-multiplexed (TDMA) onto the same carrier frequency. Every 26th pulse is omitted, causing an 8.3Hz
periodicity in the signal. Fig.33 demonstrates how voice is transmitted in bursts.
The constellation diagram derived from the various technologies is provided below. Starting from the basic GSM to
HSDPA and LTE, we see that the fundamental principle of all these technologies at the lower layers remain the same. As
the access technology evolves, it caters to more data speed by squeezing more symbols on the complex plane. Hence the
distance between the symbols decreases and so are the chances of error. Hence newer methods of error corrections are
required. The layers 5 to 7 become more intelligent to cater to advanced mobility management, location management,
high bandwidth and presence related applications.
More intelligence in the application layer necessitates the devices and the network elements to be more complex, and
hence increases the cost and the complexity of network processes, design and operations.
In figure 33, we see the constellation diagrams for each access technology (2G/3G/4G) and also the proposed technology.
There is a fundamental and philosophical drift from the present day technologies, as we see in our proposed access
scheme. Here we see that a certain category of the symbols which lies at the outer ring (propagated at very low frequency,
proportional to the call attempt rate of a mobile network), are employed for identifying / addressing the user in the
network plane. As the frequency is low, hence symbol error factor and loss is relatively decreased.
The other 4 symbols in the inner ring and propagated at the real data rate following QPSK, the same followed today by
various mobile technologies.
So with this mechanism, the same time slot is used for control and data, with different multiple access schemes, once by 8
PSK for addressing and then with QPSK for data traffic.
GSM 2G (BPSK)
67 Smart Mobile Network Access
Topology
Figure 34 : 4 Constellation diagrams for 2G/3G/4G and proposed Smart Multiple Access
Addressing: As the multiple access scheme Addressing: This is done at the layer 7 by BSSAP
facilitates to directly address a node at the in case of GSM. In case of CDMA, the
physical layer, hence less signaling resources methodologies are described in IS95/CDMA 2000
are required. [6] or the protocols beyond.
Layer 7 activities of the Network devices: Layer 7 activities of the Network devices: The
The network devices for the RN are involved BS system needs to carry out the layer 7 activities
in layer 7 activities only for supplementary for location & mobility management, addressing
services and call control and call control.
3.6. Addressing and Numbering Plan followed for the global mobile network
The Mobile station will be assigned the E.212 address, while at the core network, this will be mapped to the E.164 or
ENUM address, as is prevalent in modern day mobile communication systems. The HLR /HSS will hold this mapping.
Hence in case of paging, the E.212 address will be used to address and identify the user in the network area. When the
subscriber is provisioned in the HLR/HSS, the Symbol coordinate, Time stamp and the base frequency number will be
mapped to the E.212 address of the subscriber. The E.164 address is the phone number of the Mobile station.
3.7. Comparative analysis of the signaling processes and overhead for mobility
management in the State-of-the-Art and the proposed smart network
The unique mobility management procedures in SMNAT is not designed specifically for one specific application scenario
but for supporting coexistence of M2M, M2H, H2M and H2H applications. The motivation is to reduce the signaling
interaction between the network and the device, actuate a better congestion control and thereby alleviate the impact due to
existence of heterogeneous devices in the mobile network. The following section to scrutinise the major differences
between the State of Art and the SMNAT in terms of signaling and mobility management is applicable for all types of
User Equipments including the M2M terminals.
Static scenarios
• Always-update: In this scheme, the user updates its location whenever it moves into a new cell.
• Never-update: In this scheme, the user never updates its location, which means that the location update overhead is zero,
but may lead to excessive paging.
• Reporting cells: In this scheme, the user updates its location only when visiting one of the predefined reporting cells.
• Forming LA: In this scheme, the user updates its location whenever it changes an LA.
• Predictive distance-based: In this scheme, the network determines the probability density function of the user’s location
based on location and speed reports.
The MME houses the location update algorithm to cater to any of the above mentioned scenarios. The signaling overhead
for a location update message as seen in the core network is around 378 Bytes. Depending upon the scheme chosen, the
total overhead for exchanging the Location update message can be determined. Fig. 35 shows a Location Update message
showing layer 3 to layer 7.
71 Smart Mobile Network Access
Topology
Before the application layer message for location update are sent, the LTE handset initiates the synchronisation and
random access process to acquire a channel. Fig. 36 demonstrates the synchronisation and the random access process for
the LTE access layer.
72 Smart Mobile Network Access
Topology
Figure 36: Synchronisation and the Random Access process for the LTE Access layer
The processing of MIB /SIBs reception by the handset (40 ms in case of MIB and 80 ms in case of SIB 1) consumes
battery power in the handset.
The set of cells in a network is denoted by N = {1, . . . ,N}, and the set of TAs currently in use is denoted by T = {1, . . . ,
T}. The vector t = [t1, . . . , tN] is used as a general notation of cell-to-TA assignment, where ti is the TA of cell i. TA
design t can be alternatively represented by an N ×N symmetric and binary matrix S(t); in which element sij(t) represents
whether or not two cells are in the same TA, i.e.,
[6]
[7]
73 Smart Mobile Network Access
Topology
Paging in LTE
In most cases, this paging process happens while UE is in idle mode. This means that UE has to monitor whether the
networking is invoking any paging message to it and it has to spend some energy (battery) to run this "Monitoring"
process.
The paging procedure is used by the network to request the establishment of a NAS signaling connection to the UE. The
network shall initiate the paging procedure for EPS services using S-TMSI with CN domain indicator set to "PS" when
NAS signaling messages are sent to the UE.
Paging in LTE happens via PDCCH channel. The UE listens to the PDDCH channel in given intervals, but not
continuously. This is done by DRX (Discontinuous Reception) in order to save power.
The DRX LTE has two timing units as many of other technology. Timing Unit in Frame scale (SFN: System Frame
Number) is one unit and the timing unit in sub frame level (Sub-frame Number). It means that the network needs to know
both SFN and Sub frame Number to locate exact position in LTE time domain. Regarding the paging cycle, PF (Paging
Frame) + PO(Paging Occasion) let you know the exact timing when UE has to wake up to catch the paging message being
sent to it.
T is DRX cycle of the UE. T is determined by the shortest of the UE specific DRX value, if allocated by upper layers, and
a default DRX value broadcast in system information. If UE specific DRX is not configured by upper layers, the default
value is applied.
It means UE can get the T from two different sources, one from the system information (SIB2, IE defaultPagingCycle)
[30] and the one from upper layer. If upper layer send the value, it use the T value from the upper layer, otherwise UE has
to use the value from SIB2.If T is 5 Milliseconds, then the handset will not be able to receive a page message unless the
DRX sleep cycle is completed.
Paging in LTE is done at PDCCH using the S-IMSI (SAE- Temporary IMSI) for addressing which is a 32 bit value.
The address for the page message is the symbol coordinate at a specific time slot in the radio frame (in the Predefined
AFCRN) assigned to the UE. The UE is always in the sleep mode, except the fact that it has to wake up to listen to the
specific time slot assigned to itself in the available AFCRNs available within the spectrum. The UE does not need to listen
74 Smart Mobile Network Access
Topology
to the entre radio frame. This is not possible in the State-of-the-Art as the paging information can arrive dynamically from
any time slot in the frame.
The time slot carries only a single symbol with a repeated transmission of 4 times. If each symbol measures a time span of
1 micro second, the total time of the radio frame is 10 ms (say), then the UE has to remain live for 4 micro seconds. Lower
time to live implies better battery power conservation.
Secondly, no higher layer addressing parameters are used for paging which also conserves the bandwidth. The layer 7
parameters are exchanged only when the paging process is completed and the time slot is seized between the UE and the
CP (coordination processor) for the conveyance of the signaling and data information. This is the primary advantage of the
SMNAT over the state-of-the-art where it is not possible to confine the paging process to a layer 1 activity.
The time period during which the UE needs to wake up can be calculated as follows (refer Fig. 37) Let each frame
pertaining to a single AFCRN contain n to n+k time slots.
Say the coordinate symbol (of the complex plane) assigned to the specific UE arrives in K th time slot.
Let there be AFCRNs ranging from i to j.
Hence the time period for which a UE needs to be awake within the radio frame
=4∑ ( ) [10]
where n can range from 0 to K.
As we have a repetitive code (4 repetitions) for error correction, so the total time is multiplied by 4.
75 Smart Mobile Network Access
Topology
1. Environment sensors
2. Connected cars
3. Smart objects and robots
4. Health equipments
5. Small cells not owned by the mobile operators.
According to the newly formed group called METIS (Mobile and wireless communications Enablers for the Twenty-
twenty Information Society), which is a consortium of mobile OEMs, operators, academic institutions and automotive
companies a 5G Network should have 1000 times higher mobile data rate volume per area, 10 to 100 times more
connected devices, 10 to 100 times higher typical user data rate, 10 times longer battery life for low power devices and 5
times smaller end to end latency. The main objective of the project is to lay the foundation of 5G, the next generation
mobile and wireless communications system. The aim is to let people seamlessly bridge the virtual and physical worlds
offering the same level of all-senses, context-based, rich communication experience over fixed and wireless networks.
Apart from these basic needs, one need systems which can work with the same performance level in the crowds. It should
76 Smart Mobile Network Access
Topology
offer the same QoS and throughput as in office, or home as on the move. It should render low end to end latency and
reliability to enable machine type applications.
Standards around 5G are evolving. So an accurate definition of 5G still does not exist. Below is a snapshot of how some
network vendors visualise 5G.
5G mobile communications technology is the next generation of 4G LTE networks technology and can offer data
transmission speeds of up to several tens of GBPS per base station. Once 5G networks are commercialized, they will
allow users to transmit massive data files, including UHD movies and remote medical services, “practically without
limitation,” Samsung claims. A 5G network will comprise of small cells densely clustered together to give a continuous
coverage implementation of Dynamic Spectrum Access.
According to Huawei, Massive capacity for delivery of services available in 5G will allow connections between end users
and the network to be made at “faster than thought” speeds – so fast that the apparent distance between connected people
and connected machines will shrink to a virtual “zero distance” gap. An instant immediacy in mobile services will lay the
foundation for a whole new set of mobile apps to proliferate and push the capabilities of communications beyond what is
currently possible. A more massive capacity for managing connections will better enable a greater widespread adoption of
M2M services and interactions, and will facilitate innovation in localized mobile service delivery.
The connection essentially comprises “short” wireless links on the end of local fiber optic cable. It would be more a
“nomadic” service (like WiFi) rather than a wide area “mobile” service using the millimeter wave bands (20 – 60 GHz) so
as to allow very wide bandwidth radio channels able to support data access speeds of up to 10 Gb/s.
a) Multi-Tier 5G Networks
b) Physical Layer based Network Coding
c) Generalized frequency division multiplexing (GFDM)[55]
d) Non Orthogonal Multiple Access (NOMA)
e) Cognitive Radio
f) Device to Device (D2D) communication
g) Beam Forming technology
h) Millimeter wave technology
i) Massive MIMO
However, the scope of this chapter is not to investigate on all these options and not to provide a comparative analysis.
Rather, some new paradigms which have the potential to play pivotal roles in shaping up the 5G network architecture and
the D2D communication framework are staged. In D2D communication, user equipments (UEs) exchange information
amongst themselves peer to peer over a direct link using the cellular resources instead of through the base station or
eNodeB. This is markedly different from small cell (femtocell) communication where UEs communicate with the help of
small low-power cellular base stations. D2D users communicate directly while remaining controlled under the cellular
access network. This optimises resource utilisation in a cellular network and boosts spectral efficiency.
77 Smart Mobile Network Access
Topology
a. D2D communication: a study on the existing approaches with the new approach, the Smart Mobile Network
Access Topology (SMNAT).
Imparting D2D capability in a mobile device impacts the whole of the network framework and is not an inconsequential
addition. Issues like authentication, real time billing, fraud control will crop up and the devices directly will interact with
each other bypassing the network.
1. As the paired devices are in the same cell sector, or in the same cell (different sector) or in adjacent cells are in
physical proximity, high data rates with low latency can be achieved.
2. Depending on the proximity of the devices, the radio power level will be reduced. This will result in better battery
life.
3. As the same radio resources are used for cellular and D2D communication, hence the average frequency reuse
factor will be better.
4. For a traditional cellular network, one needs 2 distinct channels for uplink and downlink between the UE and the
BS. But in case of D2D communication, a single channel can be used for both directions. Hence the overall
spectral efficiency is better.
5. The spectral efficiency can be further enhanced if the cognitive radio communication is used wherein the unused
spectrum holes may be utilised for establishing direct communication between the 2 nodes.
6. As the D2D communications has limited dependence on the network infrastructure the devices could be used for
instant communications between a number of devices within a range.
7. D2D on 5G would use licensed spectrum and this would enable the frequencies to be used to be less impacted by
interference.
8. In times of natural calamities where some essential components of core and access network have failed, D2D
communication can ensue.
78 Smart Mobile Network Access
Topology
As a practical implementation scenario of an Over the Top (OTT) application meant from smartphones (for device to
device communication) is from Google. A new mobile messaging application called FireChat is empowering nearby
smartphone users to stay in touch even when there's no cellular service or Internet connection. The messaging app
harnesses a technology called wireless mesh networking, which might someday allow a myriad of devices to connect like
links in a chain. The technique might someday be used to tie together thousands of devices with built-in radios and make
it possible to be online without having to pay for the access. It could also enable online communications in remote areas or
disaster zones without Wi-Fi or cellular signals.
D2D has been proposed as a Rel.12 3GPP feature. D2D Study Item had an approval in 3GPP SA1 (Services working
group) in 2011, called ProSe (Proximity based Services)[48] which identifies the use cases and envisage the requirements
including network operator control, security, Authentication, Authorisation and Accounting (AAA) , regulatory aspects,
public safety requirements, integration with current infrastructure, network offloading. The ongoing discussion by ProSe
includes evaluation requirements, D2D channel model, resource use, ProSe discovery and ProSe communication, etc.
ProSe Communication between two UEs in proximity is established by means of a communication path established
between the UEs.
Device to Device communication for M2M type devices is a topic of interest for many telecom researchers. This is
because of the huge volume of the devices which may eventually clog up the Mobile network and jeopardise the human to
human services. The study on D2D requirements for MTC Device to MTC Device scenarios covers
• The identification and functionality needed to set up a connection towards a MTC Device.
• The IMS domain may provide a solution for this required functionality.
• MTC Devices often act as a gateway for a MTC capillary network of other MTC Devices or non-3GPP devices
D2D group for Machine type communications (M2M) Study on Enhancements for MTC is a 3GPP specification - TR
22.888 [49] has been crafted in purview of these requirements.
Out of band D2D essentially implies that the devices use a radio technology in the standalone mode to actuate
communication with a paired device. The pairing method is in the purview of that specific radio technology.
In-band D2D communication implies that the devices use the cellular spectrum and the cellular technology.
80 Smart Mobile Network Access
Topology
In this chapter, a new concept for the realisation of in-band D2D not by using new resource allocation methodologies but
to use a new mobility management and addressing concept called SMNAT (Smart Mobile Network Access Topology)
[13] has been presented.
The subsequent sections will bring out the various radio resource management technologies that can be employed in the in
band D2D communication, as seen in the State-of-the-Art. These technologies are based on the underlay cellular network,
hence they fall in the category of in-band D2D communication methods.
The random selection of 2 pairs may not alleviate the performance of the network and optimise the system capacity. This
is because of the fact that channel conditions between the mobile node and the base station can vary to quite some extent.
This may lead to disproportionate SINRs between the nodes and the BS, entirely depending on the channel quality. Hence
User Grouping based on proportionate parameters is done by the network based on some Cost Function so as to optimise
the performance.
Figure 39: Interaction between the Initiating Device, candidate (pair) device and Base Station for realising Network Assisted
D2D communication
81 Smart Mobile Network Access
Topology
In [52], the radio resource allocation scheme using FFR is proposed. Different resources are allocated to the D2D UEs
according to their location in the cell. If the D2D UE resides in the inner region of a cell, then they can use the frequency
band that is not used by the eNodeB for relaying to the D2D UEs [55]. The ratio of different frequency reuse factor and
the corresponding power level are optimized or adjusted adaptively according to the traffic load and user distribution.D2D
and eNodeB relaying UEs located in the same cell do not interfere because radio resources from another frequency band
are orthogonally allocated to the D2D and the eNodeBs relaying to the UEs.
In [54] a joint subcarrier and power allocation method CR-D2D-MC for cognitive multicast with D2D communication
coexisting with cellular networks has been proposed. The impact of imperfect spectrum sensing is considered in the
proposed problem, which results in the capacity decrease of the cognitive multicast. The simulation results show that the
proposed algorithm improves the spectrum efficiency and maintain a better trade-off between capacity and fairness for
cognitive networks in a low algorithm complexity. Therefore, employing cognitive multicast based on D2D is able to
explore more potential spectrum resources adequately to improve the system performance, and make it possible to satisfy
the requirements of multiple kinds of high rate transmission.
We follow a two stepped approach to integrate SMNAT with 5G network as elaborated subsequently..
WLAN can be integrated by the EPC core as it permits integration with non 3GPP untrusted network via the ePDG
(evolved Packet Data Gateway).From the architectural perspective, WLAN and SMAT have some proximity as both of
them have similar network topologies. Hence as shown in Fig 40, the end to end integration between SMNAT and EPC is
shown.
82 Smart Mobile Network Access
Topology
The UE establishes a communication with HSS through ePDG for actuating EPC authentication. At SMNAT end,
RADIUS based authentication is followed alike the EAP-AKA mechanism. The conversion rules from RADIUS to
DIAMETER (EPC) follow the GSM IR 61 recommendations. The data transfer between the UE and the IMS core is
established via the S2b interface between the ePDG and the PGW.
The call flow is shown in Fig 41. It can be seen that 2 processes are covered.
1. Authentication
2. Data transfer
It may be interesting to note that mobility management messages are not exchanged with EPC. In a State-of-the-Art (LTE)
network, the UE actuate NAS signalling with the EPC. NAS, which is a layer 7 process is not implemented in SMNAT.
Rather SMNAT is dependent on a process where location management is realised via layer 1. This is the reason, the
mobility management messages like Location Update / Location Cancellation are not seen (Fig 41). SMNAT can directly
fit in the architecture which has been realised for integrating WiFi with EPC.
Figure 41: Call Flow between UE, SMNAT access and EPC core
The long term approach is to evolve the eNodeBs and MMEs as to be compatible with SMNAT architecture. As the
mobility management part is simplified, these smart eNodeBs will thrive on physical layer addressing, rather than the
communication on NAS.The MMEs will be closer to the definition done for Coordination Processor, which can directly
engage itself in physical layer addressing and mobility management. Hence both eNodeB s / Home eNodeB and MMEs
will be lighter in terms of power consumption and processor capacity than the state-of-the-art networks.
84 Deploying the Novel Multiple Access
Scheme for a Global Mobile Roaming
Network
SMNAT can be deployed as a access and core network layer (Fig 42), located on the same network
plane as the WISDOM 5G [57][58][59] based on cognitive communication. In such a scenario,
SMNAT will be dedicated for D2D communication, while WISDOM will be responsible for global
cellular roaming within the network area or beyond.
The available spectrum will be allocated between SMNAT and WISDOM. The ratio of the spectrum
allocation can be determined through the process of network planning and can vary according to the
traffic characteristics and the business requirement of the particular operator.
To decide whether D2D leg will be established or not, there are 2 possible options.
When any device initiates a communication process on data, it will have 2 options. It will be given a
chance to try a D2D communication with the incentive of a faster communication process or lesser
data charges (if offered by the Network Operator).
If the device does not opt for the D2D option, then the session will be established via the normal
process of Enhanced Packet Core (EPC) signalling. Subsequently, the EPC can further decide whether
to terminate the session to the candidate device via LTE / LTE-A, or the network will send
instructions to the device rather to automatically initiate a D2D session.
As evident from Fig 43. D2D transport channel can be established directly between 2 nodes in case
they are in proximity (same or different cell), but facilitated by the SMNAT Access and core network
(for signalling). In case the devices are not in the direct signal range of each other, then the traffic
channel will be established via the SMNAT Access and core (Access Point Frame
Multiplexer D2D Server).But this process uses the addressing and mobility management methods
pertaining to the physical layer as defined by SMNAT.
Figure 43: D2D Channel establishment based on proximity of the paired device.
86 Deploying the Novel Multiple Access
Scheme for a Global Mobile Roaming
Network
In Fig. 44 the end to end call flow for D2D channel establishment is shown, which is self-explanatory.
In this scenario, the Mobile device A originates a call towards mobile device B where there are two
possibilities.
• The devices A and B are in the same cell. In this case the channel is established via local
access point in the vicinity of the devices.
• The devices A and B are in different cells. In this case the channel is established via the D2D
server.
D2D server is a core network application platform which is responsible to establishing the pair, either
directly between the two devices or via the core network using physical layer addressing and mobility
management.
Figure 44: End 2 End communication channel establishment for D2D for a Mobile Originating , Mobile
terminating call.
87 Deploying the Novel Multiple Access
Scheme for a Global Mobile Roaming
Network
As explained before, D2D communication can be established in the direct mode or via the network
depending upon the proximity of the devices, channel conditions and location (both devices in the
same cell or different cells). Network Security have become a primary concern especially for the D2D
communication.
In case of the network assisted D2D communication, the network can enforce the security methods
that are in place for cellular communication. The integration of SMNAT with the EPC has been
shown in Fig 40 & Fig.41, where the conventional EAP AKA method meant for traditional WLAN
network can be used. The ePDG (Evolved Packet Data Gateway) /AAA (Authentication Authorisation
Accounting) platform modifies the RADIUS based authentication messages to AKA based EPC
88 Deploying the Novel Multiple Access
Scheme for a Global Mobile Roaming
Network
authentication parameters over DIAMETER directly with the HSS. The EPC authentication vectors
including ciphering keys that are downloaded from the HSS will be retranslated and compared for the
purpose of authenticating the UE.
However, for the direct mode of D2D communication, where two devices need to pair with each other
using the cellular channel, the procedures become intricate. Generation of symmetric keys for the
communicating peers without key exchange is challenging. One of the methods is to generate the keys
is based random variations of wireless channel like Channel State Information (CSI). Most of these
methods usually use the measurement results of individual subcarriers. But this is not robust, given
the fact that the subcarriers in proximity can have similar channel conditions and have strong
correlation dependence. Due to this fact there can be repeated segments in the key, which may be easy
to crack. Another approach is to use RSS Key generation mechanism based on channel measurements.
But the main issue is that it is not designed to meet the requirements of a system demanding key
generation at massive scale. Bit generation rate is low as a single sample can provide a single RSS
value. This also becomes vulnerable if the UE is static and the channel conditions are predictable and
the channel variations are predictable. Hence the endeavour of the researchers is to realise a method of
key generation based on CSI, but not based on a single subcarrier. In [59], a new algorithm termed as
KEEP has been proposed. KEEP aims to actuate the key generation process by incorporating the
following sub-processes.
1. Dropping the inconsistent bits by exploiting the correlation of CSI measurements from
multiple carriers. This is executed by a federated filtration method.
2. Implementation of Universal key for validating consistency of bit streams between two
communicating channels. A pair of devices exchanges only a part of the hashed keys, which
makes it difficult for the attacker to guess and formulate the whole key.
3. Using methods of key recombination and adaptive quantisation to generate secret bit from a
large number of subcarriers. The bit mismatch rate with the process is low. Moreover, it
eliminates the correlation of bit streams from multiple subcarriers and reduce predictivity.
The has key generation process based adaptive quantisation procedure, CSI sub – blocking and
hashing is captured in the following algorithm in Fig 46.
89 Deploying the Novel Multiple Access
Scheme for a Global Mobile Roaming
Network
5
Channel Impairments and error control mechanisms
4.0. Introduction
A signal propagating through a wireless channel is subject to various physical effects of radio wave
propagation.
Some physical effects impacting the propagation of the signal are provided below.
The proposed multiple access scheme is not free from these physical effects and the losses due to
them. But the impact on the addressing of the mobile nodes due to these losses may be a bit magnified
compared to the present day mobile access technologies.
Let us explain why. With the present mobile communication technologies, like GSM/UMTS, the
access channels and the traffic channels are distinct and separate. There are dedicated error correction
mechanisms defined for these two categories of the channels.
For the existing technologies the mobility management related functions are dependent on the higher
layer functionalities. So while there is a basic error correction at layer 2 to ensure that the correct
information (symbols) are carried over to the far end, but then it is mainly the layer 5 to 7 which
actively take part in actuating the mobility/location management and the addressing related functions
of the mobile station. At layer 5/7, there is an extra leg of validation and authentication carried out to
ensure that the addressing information has arrived for the correct mobile node.
In our proposed technology, the addressing part is directly handled by the lower layers, namely layer
2 of the OSI stack. The errors in the physical channel can distort the coordinate of the symbols in the
complex plane, leading to wrong addressing. Hence any error at access channel implies that the
addressing related functionality is impacted, which means the rate of success of any call events like
call maturation, SMS, data session setup etc is jeopardised.So it is extremely important to ensure that
we employ the correct and a robust error correction mechanism to ward off this kind of situation,
which can in effect endanger the practicality of such a multiple access technology. The major
difference between the proposed technology w.r.t the GSM/CDMA technologies is related to the
impact of error control. The details are as follows.
92 Channel Impairments and error
control mechanisms
As indicated that we do not have 2 separate channels for the conveyance of signalling and data
information. Instead a time slot is first used for the addressing purpose, and when the process is
completed and the target node identified, the same time slot transitions to a state identified by the
mobile node, so that the time slot can be used for data communication.
Hence we propose two different error correction mechanisms, one to be used when the time slot
acts as an addressing channel, and a different error correction mechanism when the mobile
node acts as a traffic channel.
We propose a 2 step process to the error correction mechanism. The process starts with a repetitive
code as explained. In such codes each bit of the message is repeatedly sent an odd number of times so
that a simple majority decode rule can be followed to recover the original message. For example, the
repetition code may send each symbol three times and then decide to decode and determine the given
symbol. So in general, if each bit is repeated 2*n + 1 times then the code can tolerate up to n errors.
Repetition codes are not very efficient as they increase the size of a given message by a factor of 3 or
5 say, depending on the repetition parameter. The redundancy added by a repetition code is just
additional copies of the message itself, whereas more sophisticated codes add a smaller more
intelligent amount of redundancy that can specifically pin point errors and correct them. More
compact and intelligent forms of redundancy come at a cost of additional message processing for both
the sender and the receiver. A definite advantage of repetition codes is simplicity both in encoding,
and particularly decoding. So during any call processing when there is an attempt by the network to
reach the mobile node, the network will transmit the same symbol pertaining to the specific
coordinate in the complex plane and the fixed time slot (allocated for the target mobile node).
The receiver (mobile node) will calculate the error between the symbols by calculating the Euclidean
distance between the reference symbol and the received one. If the mean error is less than ∆e (error),
then it will respond back to the network. So if the error is less than ∆e for each incoming code, the
target mobile node responds back with the same symbol repeated the same number of times. Below
(Fig 47) is the handshake process between the network and the mobile station.
93 Channel Impairments and error
control mechanisms
Now after the mobile node completes responding back with the same symbol 2n+1 times ,the
Network again generate the symbol 2n+1 times, to enable the MS to actuate a quick BER test to
assess the channel quality.
For the addressing part, the symbols will be transmitted at the rate of the call attempts made per
second (CAPS) in the network. Needless to say that the CAPS rate is much less compared to the
actual traffic data rate. Hence due to the lower data rate, the symbols that will be transmitted
following 8PSK modulation scheme (outer ring) will be much less prone to channel impairments
compared to the symbols transmitted for the data traffic (inner ring).More the data rate, more symbols
are packed in the complex plane implying that the spatial distance between the symbols decreases.
This makes the channel more susceptible to error.
Hence we assume that 10^-6 is a modest threshold for BER rate above which the error coding
mechanism needs to be altered for the purpose of accuracy in the addressing symbol bit transmission
and reception.
If the BER is 10 ^-6 to 10^-10, then there is no further coding action is required and the network /
mobile node can conclude that the identification process is completed. The mobile node and the
network registers this process as completed for the given activity and related to the particular mobile
node. However if the BER is more that 10^-6, then the mobile node generates a layer 7 identification
message with the IMSI parameter written. It is transmitted in the same time slot towards the network.
94 Channel Impairments and error
control mechanisms
The network has to respond to this message with the information regarding the call request (with the
appropriate parameters). This response message shall be accepted and processed by the mobile node.
The mobile node and the network thus reserve the time slot for the transition towards a traffic
channel. The algorithm that will be used is below in Fig 48.
Figure 48 : Layer 1 and Layer 7 Error correction algorithm for the network and the Mobile Stations
95 Channel Impairments and error
control mechanisms
During the generation of the Layer 7 identification message, the error coding scheme that should
apply is generic involving the block code, convolution code and interleaving as witnessed in the state-
of-the-art.
• the information bits are coded with a systematic block code, building words of information +
parity bits;
• these information + parity bits are encoded with a convolutional code, building the coded bits;
• reordering and interleaving the coded bits, and adding a stealing flag, gives the interleaved
bits.
• All these operations are made block by block, the size of which depends on the time slots
available per frame.
4.2. Calculation for Symbol Error (Ps) for 8 PSK with SNR = 15 Db.
Symbol error and bit error will play a major role in the proposed scheme due to the fact that the
addressing mechanism is dependent on layer 1. Though the chances of error is reduced by the fact that
the sweep frequency for the frame comprising of TS td (section 2.1) is proportional to the Call
Attempt rate , where the frequency is in order of Khz. In this section we derive an estimate of the
probability of symbol error (as in equation 8). In general, we see that it stays in the permissible limit.
Hence the network / mobile station do not in most of the cases of normal operation in good coverage
areas will need to initiate the layer 7 error correction mechanisms as described in Fig.
We denote the coefficients {sij} as a vector si = (si1, . . . , siN ) which is called the signal
constellation point corresponding to the signal si(t). The signal constellation consists of all
constellation points {s1, . . . , sM}
M ] for i = 1, . . .,M.
γb ≈ γs / !" M [12]
SNR of 15 Db is considered , which is apparently high. But as the symbol rate is low for the
addressing part (because it depends on the CAPS which is fairly smaller compared to the symbol rate
for traffic data) , channel impairment is relatively lower. Hence SNR can be assumed to be on the
higher side.
For the addressing symbols of the outer ring of the constellation diagram, we follow 8PSK.
96 Channel Impairments and error
control mechanisms
Depending on the transmission mode, radio path transmission uses different codes. The codes that
will be appropriate for the new multiple access technology are as follows.
• Block plus Convolutional Codes: these codes are only used for correction purposes. They
achieve tremendous efficiency when they are combined with likelihood estimation such as
that coming from the demodulator.
• Interleaving: Interleaving is the processes of rearranging the bits. Interleaving allows the error
correction algorithms to correct more of the errors that could have occurred during
transmission. It is combined with FEC codes in order to improve the performance of the error
correction mechanisms. Interleaving decreases the possibility of losing whole bursts during
the transmission, by dispersing the errors. Since the errors become less concentrated, it is then
easier to correct them.
In our proposed multiple access methodology the signaling and the traffic information are based on
the same timeframe. The timeslot which is used for signaling initially is reused for traffic channel.
The sampling rate for the channels differ greatly after the signaling channel migrates to be a traffic
channel once the signaling activity is completed.
So while the time slot was previously used for addressing and identification of the mobile node, the
symbol rate was equal to the call attempts per second for the mobile network.
While the same channel is used for the purpose of exchanging the traffic data, the symbol rate is equal
to the traffic data rate which is much higher. Hence the chances of the physical errors increase.
Important to mention is that the mobile nodes at both ends are aware about the state of the channels
(signaling or traffic) and accordingly chooses the right coding process for achieving the required
reliability.
We use the scheme followed by GSM for half rate and full rate channels [9]. The reasons for abiding
by the GSM norms is as follows.
In brief, the following error correction steps are undertaken on the speech channel.
97 Channel Impairments and error
control mechanisms
Assuming that we have a 244 bit Enhanced full rate Speech Frame, the following Channel coding
model comes in play [9]. This is shown in Fig 49.
The channel coding model is alike the principle followed by GSM/UMTS networks on the TCH frame
for EFR speech frame.
As per Fig 49, the 244 bit speech frame is subjected to cyclic and repetition code. The output of the
frame after adding redundancy is 260 bits. Depending upon the implementation at the operator end,
half rate or full rate encoding is adopted. Subsequently, the time frame is subjected to cyclic code and
convolution codes. The time frame is latter on reordered, partitioned and interleaved to obtain the
encrypted output.
Figure 49 : The proposed code sequence scheme after the timeslot in the particular AFCRN band is
chosen for traffic
98 Channel Impairments and error
control mechanisms
4.4. Conclusion
It can be inferred that with the employment of the appropriate error coding scheme specifically (and
separately) designed for addressing and data conveyance, it is possible to realize a robust and reliable
overall access scheme. The addressing symbol correction is dependent on simple repetitive coding
scheme if the BER is less. If it is high (assuming more than 10^ -6), layer 7 coding is dynamically
actuated.
For the traffic channel, the coding process is near to the process that we see for the traffic channels for
the UMTS networks, as it is robust and presently used by millions of users worldwide.
99 Application of the Multiple Access
Technology in the Wireless Local
Loop.
6
Application of the Multiple AccessTechnology in the
Wireless Local Loop
5.0. Introduction
Wireless technologies have been deployed in different parts of the world to provide local loop
telecommunication services. Compared to traditional wireline (copper) local loop, Wireless Local
Loop (WLL) technology solutions can be deployed much faster and at lower cost. Wireless
technologies in the local loop can be broadly categorized as cordless (low-range), mobility (macro
cellular) or proprietary. Cordless-based technologies are basically intended for high-density urban
areas due to their short range. Since they require extensive backhaul infrastructure outlays, they have
not been very successful in the present-day marketplace.
Mobility-based WLL are traditionally positioned for the macro cellular environment, which are well
suited for rural areas. They are also used extensively for providing umbrella coverage in urban and
suburban scenarios. Proprietary technologies are typically country specific and are intended for
service within urban and suburban areas. Many of these solutions are however “Near Line of Sight”,
thus limiting mobility and range. Fig 50 shows a very high level WLL deployment. The Access point,
ie the Base Station Antenna is near to the mobile nodes. The mobility is limited to the locality covered
by the Access point.
100 Application of the Multiple Access
Technology in the Wireless Local
Loop.
Colour in its electronic form, synthesized by the existing video technology, is generally used for the
purpose of broadcast, multimedia and image processing. There can, however, be a more wide and
positive use of colour if it can be employed in communications technology to serve as a carrier. In the
pursuit for attaining higher data rates, the wireless technologies come closer to the Shannon Bound of
the permissible S/N ratio, which is why, it is time to look for technologies that go beyond the
conventional multiplexing methodologies for access layer (namely CDMA, TDMA, FDMA OFDM)
and the available core network topologies. One such is to employ ‘Colour Pixel Multiplexing’ for the
access and core layer for WLL. The colour pixel is used for addressing the wireless nodes in the
network and for carrying the signaling and the bearer traffic. The present day video systems that can
101 Application of the Multiple Access
Technology in the Wireless Local
Loop.
generate millions of colours, in its electronic form have been utilized for setting up a wireless
network, serving mobile stations or computers as its nodes. This chapter attempts to unfurl this new
technique applicable for next generation WLL networks.
In the proposed network architecture, we propose a new network element called the colour server ,
which processes the video frame in the forward and the reverse channels, while each pixel of the
video frames carry the voice and data information for the mobile users in either directions. It performs
the task of a switching center that we see in the present generation WLL networks. The following
section brings out the proposed network architecture in the light of the proposed Multiple Access
Scheme.
Let us represent a wireless node by 2 pixels in a video frame as in Fig. 51. The pixel coordinate (in the
frame) is determined during provisioning the node in the Database (say HLR or HSS) [10,11,12].
The video signal carries the picture and colour information for each and individual pixels. Each
wireless node in the colour space domain is identified by a specific colour level (a combination of hue
and saturation level) and allotted a particular pixel group (which includes 2 pixels as shown in the
figure) belonging to a specific coordinate in the colour space domain [3]. A specific colour level
(band) is assigned for signaling information and an adjacent band for traffic information (to be carried
in the adjacent pixel). The wireless node can clamp on to a specific pixel group occupying a specific
coordinate of the video frame. The number of simultaneous users that a video frame can hold is one
half of the resolution supported by the video frame (since each wireless node uses 2 pixels for
communication). In case of a video frame in the forward direction, the wireless nodes generates the
102 Application of the Multiple Access
Technology in the Wireless Local
Loop.
pixel information for signaling pertaining to the type of operation, say for call generation, powering
up. After the signaling information is exchanged with the network (and the end device) and the
traffic/data channel is realized, the pixel meant for traffic channel (in Tx and Rx for forward and
reverse frame) carries traffic / data information. In case of the video frame in the reverse direction, a
particular wireless node scans the pixels available in the video frame (the pixel clock inside enables
sampling at the same frequency as the source), picks up whether it obtains any pertaining signaling
information (according to the hue and saturation level allotted to itself) in the given pixel (meant for
carrying the signaling information) and then responds to it. Subsequently the traffic channel is seized
and the one pixel meant for carrying the traffic information in the reverse direction starts carrying the
traffic information (say for ring signal) and the wireless node accepts and processes that accordingly.
The model, as in Fig. 52, explains how the video frames are synthesized for mobile / computer nodes
(eg provided for wireless communication).
Figure 52: Synthesis of Video Frames in the Forward and Reverse direction for Mobile Nodes
Apart from assigning the pixel coordinates during provisioning a mobile node in a network, a specific
colour band is also allotted for the node (as indicated previously), which is used as its identity in the
network. A band of saturation level is spread across the colour vector, a sub-band of which is meant
for signaling and the remaining for bearer traffic. Hence for the mobile node, the MIN/IMSI/MSISDN
needs to be a function of the phase of the colour vector and the band of saturation level for
transcoding voice and signaling.
Where Sb => the band of saturation level allotted to the user for signaling and bearer data
The coordinate of the mobile station in the colour circle are colour level ranges (bands) allocated for
each user, as depicted in Fig. 53.
103 Application of the Multiple Access
Technology in the Wireless Local
Loop.
As this is based on the existing video technology, our aim is to propose an architecture which is based
on the existing cable television network. The proposal is to reuse the backhaul available for the
Television / cable networks and to have the last mile radio access based on Colour Pixel Multiple
Access Technology designed for WLL access.
The diagram below in Fig. 54 shows a network of TV Japan, and how it caters to three different
categories of television subscribers over three different physical channel, Cable / Internet and satellite.
With the proposed multiple access scheme, it will be possible to use the existing television network
for implementation in voice / data communication in a typical WLL implementation.
At a high level, the implementation below in Fig. 55, indicates the usage of the Digital Television
Network for the backhaul for the proposed WLL Network. The WLL operator will need to subscribe
for a Television channel which acts as a carrier for voice and data. The operation should be low range
104 Application of the Multiple Access
Technology in the Wireless Local
Loop.
(within a mile) and Near Line of site (NLOS) operations. The aim is to avoid the channel impairments
due to the physical effect which magnifies with distance and obstructions.
For the access network, we have the BTS termed as Video – BTS (V-BTS), the only difference with
GSM/UMTS/CDMA being the fact that the network area is not divided into orthogonal cells and there
is no BSC in place. The V-BTS placed all over the network coverage area can establish an uplink and
downlink channel in UHF / VHF with the handsets. As the BTSs are not serving any cell, they need
not have any specific BTS–ID for addressing. The BTS does not transmit the BTS-ID and other
essential parameters (SID / NID /MCC/MNC) in the SPM /ESPM messages (CDMA 2000), and does
not exchange any specific BTS/Location related information with the mobile station. The MS is
agnostic to its location in the coverage area, as it is not served by a particular cell. The V—BTS s are
dumb video repeaters placed all across the network area. All the repeaters placed across different
zones transmit the same chrominance signals which carry the voice / data intelligence for the wireless
users. The number of users catered by a single colour circle pertaining to the allocated bandwidth of
37 Mhz depends upon the colour depth supported by the video technology and the resolution
supported.
The number of distinct colors that can be represented by a pixel depends on the number of bits per
pixel (bpp). The maximum number of colors a pixel can take can be found by taking two to the power
of the colour depth. Colour depth is a computer graphics term describing the number of bits used to
represent the colour of a single pixel in a bitmapped image or video frame buffer. This concept is also
known as bits per pixel (bpp), particularly when specified along with the number of bits used. Higher
colour depth gives a broader range of distinct colors.
The architecture of the WLL at a high layer showing the core network and the radio network
components is shown in Fig 56. It utilizes Colour Pixel Multiple Access (CPMA) for last mile radio
access. Please note that this diagram focuses more on the logical interfaces between the networks, but
not on the Back Haul (TV network).
105 Application of the Multiple Access
Technology in the Wireless Local
Loop.
Each handset after receiving the chrominance signal demultiplexes and extracts the information from
the pixel allotted to itself and then processes the colour signal (in terms of R – G – B Levels )
pertaining to the specific hue and the band of the saturation level in digitized form. Within the specific
band of the saturation level allotted for the subscriber , say Band A (ranges 10% to 35 % ) , a specific
sublevel say Band A1 carries the signaling information (for paging , Alert with Info , etc) and the
Band A2 , carries the digitized voice information. The heart of the network is a colour server which
processes all the colour information. The colour server interoperates with the Mobile Station through
the V-BTS / V-BSC and exchanges the SS7 signaling information with the core network accordingly.
The speech circuit between the A and the B party is established on the band of saturation level tied up
with the colour level that has been assigned for both the parties.
The primary functions of the colour server are the following [3].
2. Formulates the colour train which is a function of the dialed E.164 mobile number (of the same
serving market).
3. Performs the signaling operations (on SS7) with the core network.
4. Interoperates with the V-BTS/V-BSC for the air interface related operations.
5. Interfaces with the Legacy Networks (on associated mode of signaling and PCM Voice trunks on
F Links and on A links on quasi associated mode).
106 Application of the Multiple Access
Technology in the Wireless Local
Loop.
The flow showing all the interaction between the Mobile Station and the network for call maturation
is depicted in Fig 57.
Figure 57 : The call flow showing the interaction between Mobile Station and the Network
The following diagram in Fig 58 shows the internal constituents of the Mobile Station and the Call
Processor of the Colour server.
107 Application of the Multiple Access
Technology in the Wireless Local
Loop.
multiple subscribers will be accommodated over the same hue and different bands of
saturation level with some amount of dead spaces between each individual band of saturation
level.
The next instantaneous C signal will arrive for the given pixel after the horizontal scanning is
completed for all the other pixels in the video frame.
Hence the C signal for all the users, which is half of the resolution of the video frame
(as one pixel will be allocated for signaling and the adjacent one for voice / data)
where A = 1t
C signal = Chrominance signal + Y signal + Horizontal and Vertical & Blanking Pulses which makes
it a composite video signal.
So let % = %0 %1 2$ 2 [12]
(Hp and Hv being the horizontal sync and the vertical pulse information)
Specifically with respect to an individual user, the Hp and Hv are not to be considered.
These two parameters will be considered when the entire composite signal is expressed.
Cr signal:
Let us denote with s(t) the audio signal to be transmitted. The user i is assigned a fixed Hue Hi (0-
360o) and the entire saturation band (0-100%), which is modulated by the information signal s(t). The
saturation level Si(t) and the hue are related to the component UV by the following relationships:
3 = 4 ( ) 5 6 2
7 = 4 ( ) 6 2
8 = 0.299 ∗ * 0.587 ∗ > 0.114 ∗ @
3 = 0.436(@ − 8)/(1 − 0.114)
7 = (* − 8)/(1 − 0.299)
And that R,G,B, range between 0 and 1, then:
109 Application of the Multiple Access
Technology in the Wireless Local
Loop.
Therefore, Si(t) ranges between [0,0.753] and s(t) must be normalized to fall into that range. So, if V
is the maximum value of s(t), than the chrominance component U V can be written as a function of
the information signal as follows:
3 = 6( ) ∗ (0.753/7) ∗ 5 6 2
7 = 6( ) ∗ (0.753/7) ∗ 6 2
In the NTSC system, the U V components are combined into a single modulated Chroma signal by
using quadrature modulation onto a continuous wave color subcarrier. The modulated Chroma signal
can be written as:
Hence Cr signal is primarily a function of the color difference signals R-Y and B-Y . Green signal is
not transmitted but synthesized from R, G and Y information though a proper expression,
Cy or Y
Hence,
8 = 1.164 (8 − 16) 0.299 ∗ 1.596 (6( ) ∗ ((0.753/7) ∗ 6 2 – 128) 0.59 ∗
0.813 (6( ) ∗ ((0.753/7) ∗ 6 2 – 128) − 0.59 ∗ 0.391(6( ) ∗ ((0.753/7) ∗ 5 62 −
128) 0.114 ∗ 2.018(6( ) ∗ ((0.753/7) ∗ 5 6 2 − 128)
Hence Y = Expression K (by resolving the above equation).
Hence the final equation for the composite video signal for the different users allocated pixels / time
slots in the video reference frame is
% = ∑ [%0 %1]1 ( ) [%0 %1]2 ( − (* − 1)) [%0 %1]3 ( − 2(* − 1)) … … … … . [%0
%1]/ ( − /(* − 1)) 2$ # 7, [16]
where A = 1 to R/2
5.6. Example
Let us take the example of a SXGA video signal, which can be transmitted on wireless or CAT 5
cable.
Table 3 : Parameter values for the example to derive the number of users that can simultaneously use the
service
1. The number of users that can talk simultaneously within a video frame
1 One subscriber requires data @ 8 Khz (same as what voip uses at the moment).
2 The Pixel Pixel rate – The rate at which the pixels arrive in the display device = 139.5 Mhz
for 1280x1311@76Hz)
3 So the number of subscribers that can theoretically talk simultaneously with one colour
circle= 17438
Say if 15 percent of the bandwidth is consumed for signaling, then the total number of users that can
talk simultaneously = 14822 Calls per second.
Hence if the resolution of the video frame is 1280x1311, the number of users that can be
accommodated / provisioned per colour circle = 1310720 / 10 = 167808
Where BWS = Signal bandwidth K = Kell factor, Visual information is lost due to the probability that
some of the video information will be displayed during the retrace rather than the active portion of the
scan line. Assuming 30 percent of the visual information is loss, we have K = 0.7.
AR = Aspect ratio (the display width divided by display height) =1.33 VLT = Total number of
vertical pixels = 1067 FR = Frame rate or refresh rate = 76 KH = Ratio of total horizontal pixels to
active pixels = 1720/1280=1.34 KV = Ratio of total vertical lines to active lines = 1.04
The 1/2 factor comes from the highest frequency component in a video signal occurring when
alternating black and white vertical lines with a width of one pixel are displayed on the screen.
Because it takes two lines to form a complete cycle, the highest frequency is one-half the pixel rate.
The Kell factor represents the effect of reduced visual resolution primarily due to the line-scanning
structures. Visual information is lost due to the probability that some of the video information will be
displayed during the retrace instead of the active portion of the scan line. Even though it may seem
like half the information would be lost because there are equal number of scan and retrace lines,
empirically it has been shown that about 30% is lost to this effect, yielding a Kell factor of about 0.7.
The frame rate is the rate at which each complete set of scan lines is displayed. Because a set of scan
lines makes a complete picture, this can be thought of as the picture-update rate. Most television
signals are in an interlaced format. This is where each picture (or frame) is divided into two fields,
each with half of the vertical scan lines. This doesn't affect the calculation as long as the actual frame
rate is used in the equation. Let us recall that the frame rate is equal to half the field rate.
In our research work, we will however prefer progressive scanning and not interlacing, mainly
because of its high frame rate (60 frames per second) and the complexity of multiplexing / de-
multiplexing the ½ frame lines.
139.5MHz while allowing the signal to complete its transition during ¼ of a clock period use the
following equation.
The video (chrominance) signal is a continuous signal consisting of video frames refreshed at a
specific rate.
C = ∑v(t) , t= 0 to n
Both in the forward and the reverse channel, all the subscribers use the same channel frequency.
Because the pixel coordinates are unique and fixed for the subscribers , the colour information of the
pixels are summed up in the forward and the reverse direction by a summing amplifier/ video mixer to
form an entire video frame carrying the information for all the users.
It is like two video channels having the same frequency and you see a juxtaposed image belonging to
the two video channels.
1. Pixel coordinate, say (xi,yi). For signalling and voice /data , two pixels are utilised , hence the
pixel coordinate for voice /data = (xi,yi) and signalling = (xj,yj)
2. Өs , ie the hue allocated for a user (there can be multiple users allocated the same hue but different
frequency bands).
3. Band of Saturation level for carrying the signalling /voice information (As).
The colour processor needs to take care of all these variables for all its users when it requires
formulating a video train for data/voice transmission in the forward or reversing direction.
113 Application of the Multiple Access
Technology in the Wireless Local
Loop.
Figure 59: The Hue and Saturation level relationship in colour space domain
The above diagram in Fig 60 shows the hue and saturation level relationship w.r.t to the colour space
domain. The saturation level is measured from 0 to 100. Saturation level had to start from a finite
value, and not 0 or null value for a particular subscriber, as 0 implies pure white with no hue
information. Hence we cannot differentiate the subscriber for that purpose.
Say the Saturation level starts from 1 and goes, and the colour vector takes a particular phase
pertaining to the hue, as defined for the subscriber.
Voice can be carried as Analog voice signal on AM or might be digitized , which will necessitate only
two discrete saturation levels for carrying the voice.
The Amplitude modulation can be used here is a Double side band AM or a Reduced Carrier
Transmission AM.
Let m(t) represent a simple audio waveform that needs to be transmitted , and let M represent the
largest magnitude
m (t) = M cos (ωm. t + φm) [20]
It is assumed that ωc >>ωm , as audible frequency ranges from 20 Hz to 20,000 Hz and the carrier
frequency of the Chroma signal is in the order of Mhz.
Therefore, the modulated signal has three components, a carrier wave and two sinusoidal waves
(known as sidebands) whose frequencies are slightly above and below.
Fig. 61 demonstrates a (2-sided) spectrum of an AM signal. It has two groups of components: one at
positive frequencies (centered on + ωc) and one at negative frequencies (centered on − ωc). Each
group contains the two sidebands and a narrow component in between that represents the energy at
the carrier frequency. Therefore, we see that an AM signal's spectrum consists basically of its original
(2-sided) spectrum shifted up to the carrier frequency.
= 14822x8 khz/51.9 Mhz x 1 (14822 parallel users as in the previous calculation , 8 Khz voice band
per user & freq reuse factor of 1)
The pixel rate for the present day video technology was however determined to eliminate flicker . But
now as we are employing the technology for a different purpose (ie, as a carrier and addressing
mechanism for a wireless network) we can actually achieve a much higher data rate .
Besides the spectral efficiency, there are other factors which need to be considered where we will
benefit from this technology.
where, say, each group has one-seventh of the total radio resources, and channel groups are
assigned to base stations in the network in such a way that any two cells using the same channel
group are not adjacent. The resulting spatial separation ensures that the energy being used for a
conversation in one cell has been sufficiently attenuated by the time it reaches another cell using
the same channel that it does not pose significant interference. Reuse provides interference
management, but at the expense of operational complexity and base station capacity. A given base
station’s channel group is a small fraction of the total system resources.
• With the CPMA, frequency planning becomes easier. The whole bandwidth is utlilised by all.
Moreover the need for cell planning and frequency reuse is lessened. Hence the factors like
frequency reuse, frequency hopping, co-channel interference etc become less important, which
implied that we achieve a better spectral efficiency and a better SNR.
• Power control: Power control is a technique whereby the transmit power of a base station or
handset is decreased to near the lowest allowable level that permits communication. This reduces
interference levels in the network, increasing spectral efficiency. Power control is used in both
GSM and CDMA systems on both the uplink and downlink. CDMA systems require particularly
fast and precise power control – many users share the same RF spectrum, and the system capacity
is thus highly sensitive to inadequate interference control. The base station in case of the CPMA
,does not need any discrete address .All the base station belonging to one colour circle will have
the same identification/address .They are in fact video repeaters spread across the colour
circle.Keeping in mind the reflection factor, the video repeaters can be placed as close to the MS.
As the signaling requirement is much less in this case, hence power is conserved much better.
• Sectorization: Sectorized antenna systems take a traditional cell area and subdivide it into
“sectors,” each covered by its own directional antenna sited at the base station location.
Operationally, each sector is treated as an independent cell. Directional antennas have higher
gain than omni-directional antennas, all other things being equal. Hence the range of these
sectors is generally greater than that obtained with an omni-directional antenna, roughly 35
percent greater. Sectorized cells can increase spectral efficiency by reducing the interference
presented by the base station and its users to the rest of the network, and they are widely used
for this purpose. Most systems in commercial service today employ three sectors per site.
Although larger numbers of sectors are possible, the number of antennas and quantities of base
station equipment become prohibitively expensive for most cell sites. Cell sectorisation is not
required in our case as we work with the entire spectrum.
116 Multisource Voice coding
technology using colour coding
technique for high definition voice
transmission
7
Multisource Voice coding technology using colour
coding technique for high definition voice
transmission
6.0. Introduction
This chapter addresses a mechanism for joint source channel coding for transmission of audio signals
transcoded to lossless video signals[4]. The audio information is mapped into colour information with
the help of the intelligence derived from a phase vocoder. Each pixel in the video frame, meant for
the transmission of the audio signals over video, pertains to a specific frequency in the time domain.
A couple of harmonic frequencies along with the fundamental frequency is required to be processed
for carrying the voice intelligence. Hence, for conveying a speech signal for a given user, a number of
colour pixels are utilised. This implies that the number of users that can be accommodated depends on
the resolution that is supported by the video encoding scheme and the QOS needed for carrying the
voice. At the source, we actuate phase vocoding and colour pixel multiplexing. This part can be
termed as channel coding as we encode each harmonic in a suitable pixel and thereby render
redundancy to the original information. The video stream which comprises number of pixels per
frame pertaining to the resolution is multiplexed at the source and then transmitted using an
appropriate lossless source coding scheme. In this chapter, we consider MPEG 4 AVC which can
attain nearly 3:1 lossless compression with 4:4:4 encoding of YCbCr signal.
6.1. Description
The problem of joint source channel coding had been an interest for the scientists for decades. A joint
source channel coding mechanism for voice transmission on colour signals is discussed in this chapter
[4]. At the channel coding level, we use a phase vocoder which converts the voice frequencies to
equivalent phase time domain model. The encoding is done with the help of STFT (Short Time
Fourier Transform). The phasors derived after the STFT are dynamically plotted to a colour circle.
Each phasor information, ie the phase and the amplitude (in the time domain), is expressed in terms of
colour and is transmitted over a pixel. The number of pixels contained in the video frame depends on
the supported resolution. We actuate pixel multiplexing at the audio source, whereby the audio
frequencies of multiple sources are multiplexed at the pixel level to formulate a video frame. The
dynamic audio information from multiple sources are ported to video. At the source coding level, we
propose a lossless video transmission using MPEG_4 AVC compression mechanism by which we can
attain nearly 3:1 compression. At the receiver side, we first actuate MPEG4 decompression and
117 Multisource Voice coding
technology using colour coding
technique for high definition voice
transmission
decoding. Then the time phase model for the phase voice decoder is reconstructed from the colour
signal. Typically the tinge of the colour depicts an instantaneous phase and the saturation level brings
the modulo of the signals, ie the amplitude. For a single voice signal, each phasor depicts a particular
frequency, which is carried by a particular pixel. The number of Harmonic frequencies that can be
carried along with the fundamental frequency (f0) for a voice user depends on the type of application
or the QOS settings for the voice user. Each frequency converted to the phase time domain can be
carried by a single pixel. So as the number of harmonic frequency increases, the number of pixels
required to be allocated for a given user increases. Each pixel corresponds to a frequency bin of the
phase vocoder .The decoding happens with Inverse Short Time Fourier Transform (ISTFT) to derive
the equivalent frequencies in the time domain.
[23]
The short-time Fourier transform (STFT) is often used when a signal is too long to be analyzed with a
single transform or when it is desirable to have better time localization. The idea is to use a window
function ω (t) that zeroes all but a short time interval. All events in the FFT are then localized to that
interval. The windows are shaped so that when they are overlapped (shifted by S samples and
summed) their sum Σn ω(t-Ns) is constant for all t. This is shown in the following figure (Fig.
62) where the windows are overlapped by their half phases.
A short-time Fourier transform (STFT) is performed on a windowed time-domain real signal to obtain
a succession of overlapped spectral frames (synthesis stage). The time delay at which every spectral
frame is picked up from the signal is called the hop size. The time domain signal may be rebuilt by
118 Multisource Voice coding
technology using colour coding
technique for high definition voice
transmission
performing an inverse Fast- Fourier transform on all frames followed by a successive accumulation of
all frames (an operation termed overlap-add) (resynthesis stage).The process is shown in Figure 63.
Knowing the modulus of every bin is not enough: the phase information is necessary for a perfect
recovery of a signal without modification. Furthermore the phase information allows an evaluation of
’instantaneous frequencies’ by the measure of phases between two frames. Thus, in a traditional
phase-vocoder implementation the output of the analysis should be in explicit polar form (moduli and
phases) in order to achieve fine-grain tracking of frame by frame frequency changes.
The transform of a complex sinusoid to the equivalent moduli and phase is shown below sampled
through n number of windows.
[26]
6.3. Deriving the Amplitude and Phase from the FFT Bins to
derive the color signals
A function converts each FFT bin from rectangular to polar form to get the magnitude and phase in
each FFT bin .
[25]
[26]
[27]
M=>Number of samples
Where
And
The instantaneous color vector for a single sample for the kth bin is Ck = f (θk, Ak) .
For tth time , there are 1,2…………..k STFT bins for a single users. The bins carry fundamental
frequency (f0 ) plus all the other harmonics / semitones. The number of allowed semitones along with
the fundamental frequency will depend on the QOS configuration for the users. Accordingly, the
number of pixels (in the tth video frame) required by a given user can be determined. Each pixel can
carry information for a single STFT bin for tth time. Fig 64 shows how the colour pertaining to each
STFT bin forms the array holding the colour information of the entire video frame. The Video frame
holds the dynamic audio information.
Figure 65 shows the full scheme where the audio source is split up in multiple sub harmonics by
performing Short Term Fourier Transform. Each Harmonic information derived as a function of
120 Multisource Voice coding
technology using colour coding
technique for high definition voice
transmission
Amplitude and Phase is ported to pixels to form dynamic colour information as video frames. This is
described in more details as follows.
Figure 64: The complete scheme of STFT and ISTFT of colour pixels
Audio signals from different sources are sampled with the help of sampling windows and split up in
terms of different phase and moduli of the different frequencies/harmonics/semitones. Each of them
(for a given user) corresponds to a specific FFT bin (out of a FFT bin bank) meant for the specific
frequency.
The output of the FFT bin, in terms of the phase angle and the amplitude corresponds to a specific
colour. The tinge of the colour is dependent on the phase angle and the amplitude determines the
saturation level, ie, how much white is mixed with the colour level. This colour output for a FFT bin
is plotted against a pixel.
The digitized output colour levels of the FFT bin bank for a specific user is plotted aginst a group of
pixels , with the aid of pixel multiplexing .Accordingly , the Y,Cb,Cr signals for the source is formed.
The mapping of the FFT bin to the coordinate of the pixel is done by the array function.Each user is
alloted a channel frequency. The output of different users (colour plotted in a pixel group) is fed to an
array of PIP (Picture in Picture) modules.The PIP modules belonging to the different channel
frequencies (for different sources) jointly make a video frame. The video frames in the time domain
contsrue a streaming video which is encoded in MPEG-4 AVC.
The reverse process is followed at the receiving end to derive the audio signals for different receivers
in the order shown below.
1. MPEG4 decoding
121 Multisource Voice coding
technology using colour coding
technique for high definition voice
transmission
The basic steps of MPEG 4 AVC lossless coding [14] involves mode selection, temporal
compression, spatial compression and entropy encoding. As in Fig. 66, the first process, ie, mode
selection divides the frame in subframes with a pixel matrix of 16x 16, which are called macroblocks.
The encoder then determines whether the encoder will go for intra frame or inter-frame encoding for
the macro block.
If Interframe encoding is chosen, then motion compensation techniques are used for removing
temporal redundancy and discrete cosine transform followed by quantisation for removing spatial
redundancy of the video images.
If Intra frame encoding is chosen, the information contained in the current video frame and produces a
compressed result called I-Frame. Intra frame encoding can use only the information in as many as
five other frames , occurring before or after the current frame. Compressed results that use the data
from previous frames are called P_Frames while that uses the data both from before and after the
current frames are called B-Frames.
Figure 65 : MPEG 4 video coding to be used as the source coder for this JSCC scheme
There are various video codecs available which can actuate lossless video encoding on MPEG4-AVC
encoding. The coding schemes differ in their efficiency, governed by the compression ratio achieved
and the channel loss. There is a tradeoff between the extent of compression and the loss.
For each source, the number of frequencies per source to be considered for reconstructing the voice
signal (applicable for a telecom network) is governed by detection of the fundamental frequency and
the semitones and the harmonics.
122 Multisource Voice coding
technology using colour coding
technique for high definition voice
transmission
Each colour pixel carries a specific frequency in the phase angle domain, which is latter on converted
to the frequency time domain by Inverse Fourier Transform.
For attaining a high voice quality, if we take 16x16 resolution for each voice source, then the total
number of voice sources that can be catered by a single Mpeg frame (considering that the resolution
supported by the MPEG frame is 1024x 1024 is 64.
Hence with a bit rate of 4 MBPS, the number of voice sources that can be accommodated (rendering a
high voice quality by carrying 256 frequencies per user) is 64.
6.4. Conclusions
As the mobile network evolves to offer rich communication suite of services on top of the Voice over
LTE network, the codecs used plays a vital role today as technology differentiators. In 3G mobile
networks, we had narrow band AMR (Adaptive Multi Rate).In VoLTE, we have wideband AMR and
EVS (Enhanced Voice Services). In this chapter, we introduce a new concept for vocding based on
JSCC using colour signals. It can have many benefits over standard vocoding methods. Though a
comparison with the state of the art is not in the scope of this chapter, we opine that future research
should be carried on in these lines focussing on the implementation feasibility , integrability and
backwards compatibility.
123 Conclusion and Future Work
8
Conclusion and Future Work
7.0. Introduction
The key issues with the available network topologies are as follows
• Hugely complex process of Mobility Management and Radio resource management .Basic
philosophy remains the same across all the generations (2G/3G/4G).
• Complexity in radio network design. Network efficiency depends much on the frequency
allocation and the frequency reuse pattern defined by the operator.
Modulation Scheme :
• Commencing from BPSK (Binary Phase Shift Keying) in 2G and ending with 64 QAM
(Quadrature Amplitude modulation) in LTE -Advanced, we try to trans-receive more symbols
per unit of time.
• But constrain is the Shannon bound (ref. Shannon law) of the permissible Signal to Noise
ratio. The more the data rate, lesser in the inter symbol spatial distance (in complex plane),
more it is prone to channel impairments and errors.
• So in LTE, the handset needs to be closer to the Base Transceiver. Augmenting coverage
implies adding more base stations. Hence the concept of EnodeB and Home EnodeB has been
proposed in 4G.
• Network and Handset manage the handover to another cell when location is changed.
• All these network activities are managed by Application layer signalling processes at the
radio network.
124 Conclusion and Future Work
• So the network equipments and the handset need to be intelligent enough to compute and
process continuously the signalling messages for mobility and location management.
• The network equipments should be able to actuate these processor intensive activities, which
increases the cost of overall network .
• For the handset as well, it is the same issue as above. Moreover, these processes drain lot of
battery power, just to maintain its ‘presence’ in the network.
• Signalling messages at the radio layer consumes substantial bandwidth, which could
otherwise have been used for data traffic.
• Render more intelligence to the lower layers so that it can simplify and actuate some
processes (like addressing a Mobile Node), which are today layer 7 functionalities.
• Realise a smart modulation scheme which does not just aim to inject more symbols per unit
time. It rather (also) attempts to identify the users at layer 1 (physical layer).
• Reduce the Mobility Management and Radio Resource Management functionalities, with a
unique Access Network topology which is compatible with this smart modulation scheme.
• With the evolution of Mobile technology, we attempt to inject more symbols (data) per unit time.
• Our Smart Hierarchical modulation scheme has 2 concentric rings. Outer ring is meant for
identifying a user. Inner ring is meant for carrying the traffic for the user. Hence we render
intelligence to the physical layer.
• Handover of a call when the subscriber is moving from one cell to another is a process that
requires lot of signaling interaction between the handset and the network.
o The available bandwidth is divided in just 2 sub bands (against 125 of them as in GSM).
• For a Closed User Group Mobile Network (say like corporate networks, petroleum refineries,
factories), we do not need a network ! The intelligent handsets, along with unintelligent repeaters
(acting as Access points) will form the network. For security and lawful interception capability,
we however need a network component.
• For a Global Mobile network, we need an intelligent central processor which will act as a bridge
between the radio and the core network.
• At the core network leg, the intelligent central processor will execute the mobility management,
roaming , authentication , authorisation and other associated network processes by interacting
with other network adjuncts.
• At the radio network leg, intelligent central processor will be associated with layer 1 &2 level
activities and directly take part in analysing the frame at the ingress and help in the frame
formation at the egress.
a) The network processes, especially the mobility and location management processes in of the
State-of-the-Art are intricate.
b) The network and the handset continuously interact to actuate the intricate layer 7 processes
like Location Management, Mobility Management, Radio resource management. It consumes
processing power, bandwidth, needs intelligence in the network and handset (Mobile Station),
drains Battery power in Mobile Station.
126 Conclusion and Future Work
c) we should thrive to realise a communication system which has least dependence on the
intelligence of radio network itself , but can achieve the same level of mobility and
optimisation of radio resource.
Inference
a) The complexity existing in the various generation of the mobile networks is due to the fact
that we do not witness significant improvisations on the top of the basic OSI model.
b) So according to the structure of OSI model followed by all kinds of wireless / mobile
networks, the physical layer (layer) carries information for all users. Routing and identifying a
user in the network are controlled by the higher layers. Hence you require the intelligent
network devices in between which can actuate these operations.
c) So while the telecom researchers are striving to achieve more data speed (by trying to find out
ways to inject more symbols, ie data per unit time (4G for example ) , I was motivated to
deviate from this philosophy and to aim to actuate a radical drift from the existing top heavy
network architecture.
d) In the State-of-the-Art Network, the primary drivers for the complex processes like Mobility
and Location management , are meant for locating , identifying and addressing a mobile user
in a network.
e) If we have a way to actuate user identification (in the network) by using lower layer
processes, we can simplify or eliminate the higher layer complex processes and hence reduce
the intricacy and cost of the mobile network elements and the handsets.
f) Every 30 minutes, the handset initiates a control message to update its location towards the
Network. Handover process also requires substantial control channel message over the so
called ‘signalling channels’. All these actions are for maintaining its presence and to actuate
the basic operations, like controlling mobility, making / breaking a call etc. This consumes
processing power, signalling resources and also drains out battery.
g) Hence we proposed a modulation scheme, part of which is directly related to the addressing
function. Presently , for all mobile communication systems modulation schemes are designed
only for carrying user data .
7.3. Parallelism
a) So the big question is: Is it possible to realise a communication system without an intelligent
radio network? Is it possible to have a mobile network with passive signal repeaters or alike
devices?
b) Let us take a simple example : Radio call systems for the cabs
c) There is no network. Just a central transceiver at the Cab station.
d) It is a broadcast network. The cab chauffer waits to pick up the name, number, location etc
for his turn. This information is processed by the chauffer’s brain, and not by the network. If
you needed the information to be processed by the network, such that the information relevant
to the chauffer is only channelised to him, then we would have needed some intelligence
somewhere in the network to do this. Let us call this intelligent entity sitting in the network as
MR X, and let us call the chauffer MR Y.
e) The fundamental difference between the present cellular topologies and the proposed one is as
follows.
127 Conclusion and Future Work
f) All present mobile network (comprising of the active network components in the radio and
core layer) act as MR X. So he has to sit somewhere in the network. His real analogue in a
mobile network: the radio and core network adjuncts (BTS/BSC/Mobile Switch etc).
Specifically in 4G, they are like the eNodeB , MME (Mobility Management Entity) , SGW
(Serving Gateway Entity ) etc.
g) With our proposed methodology, the active network component acts as MR Y sitting behind
his radio trunking set in the car. From network perspective, it relates to the Handset and the
transmission medium. No need of network intelligence active network components.
h) Off course you still need the core network processes for Authentication, Authorisation,
Accounting (Charging, billing) and all the supplementary services (CLI, call conference,
SMS, MMS) and VAS.
i) So, it is time to think behind the conventional topologies.
j) For a network with limited mobility and closed numbering scheme, it is possible to build up a
network quickly with passive devices.
k) For the full scale mobile network, the architecture and the network processes are simplified to
a considerable extent.
7.4. Prognosis
a) Simplifying the network is one of the key drivers for 5G. Even a popular source like the Wiki
says so, and so believes the telecom community.
If 5G will come true and reflect these prognoses, the major difference from user point of view
between 4G and 5G techniques must be something else than increased maximum throughput,
for example lower battery consumption, lower outage probability (better coverage), high bit
rates in larger portions of the coverage area, cheaper or no traffic fees due to low
infrastructure deployment costs, or higher aggregate capacity for many simultaneous users
(i.e. higher system level spectral efficiency).
c) With the advent of intelligent handsets, we tend to become more agnostic to the services
offered by the network, but more dependent on the services offered directly by the OEMs like
Apple, Nokia.
d) When we use Skype (or other Over the Top services), we see Skype as a service and do not
think about the internet provider.
e) The next generation smart network technologies will permit that. With the present day
technologies, this is not possible, as there is still heavy dependence on the mobile network
just for rendering the basic services like call or SMS.
f) If we are able to relieve the network from these activities by some smart topology, and make
the lower layer more intelligent, then we can utilize this delta processing power in the handset
to fuel the next intelligent applications.
7.5. Advantages
Less control signaling in the radio layer implies:
a) Catering the growth and penetration of Mobile Subscribers by realization of more Micro /Pico
cells with substantially lesser CAPEX & OPEX and network planning. Ideal for dense
demography.
128 Conclusion and Future Work
7.6. Conclusion
It is imperative that with the changing landscape of the mobile telecommunication industry, the
networks need to cope with the ever increasing volume of mobile users. Some of them are human
users, some of them are integrated with machines communicating with their peers at the other end.
We also have mobile networks for the Intelligent Vehicle Communications. The State-of-the-Art
mobile networks are poised to meet the bandwidth demand. But more emphasis should be imparted to
simplify the network architecture and the processes. With an all IP network as we see in case of 4G,
the network architecture had been simplified reasonably. But there is no major shift or simplification
of the network processes, especially mobility management. At present, mobility management is
explicitly in the domain of the application layer. We propose to shift from this paradigm and knit this
functionality with the physical layer. This entails simplification of network architecture and associated
processes and helps in attaining a network which is location and presence agnostic. The interaction
between the device and the network occurs only when one of them initiate a network operation for a
call, SMS or other services. Exchange of Location updates between the network and the mobile
device is eliminated. The handover operation is also simplified. The immediate benefits are: boost
bandwidth optimisation, power utilisation and performance of device/ network processors. In course
of time, the tele-density will increase even more resulting in smaller cells. Considering the state-of-
the-art topologies, this will in turn induce more signalling messages due to the mobility factor.
However with the smart network topology, we aim to trim off the mobility management processes and
the related messages in an endeavour to streamline the performance of the overall network
With the typical M2M and H2H implementations that are foreseen, we need to attain a breakthrough
in (battery and RF) power management in the mobile devices. Thanks to nano technology, there is
significant progress in this domain. But this needs to be further endorsed by the enhancements in
mobile network itself, by moderating the network interactions between the handset and the network.
To summarise:
• If we have a method to actuate user identification (in a mobile network) for the purpose of
mobility management by implementing lower layer processes, we can simplify or eliminate
the layer 7 processes and hence reduce the intricacy and cost of the mobile network elements
and the handsets. This has been realized through SMNAT
• This implies that the mobile devices will derive more processing and battery power required
for catering the next generation applications.
• The cost of network elements of the core and access networks will reduce as the dependence
on application layer processes are diminished.
129 Conclusion and Future Work
• A mobile network based on smart location management and addressing scheme provides an
elegant solution to address these basic needs and helps in fostering this new breed of nano
mobile devices.
• The access network design is simplified with less resource hungry processes associated to
mobility management. This aligned with our endeavour to reduce the carbon footprint of the
mobile networks.
130 Bibliography
9
Bibliography & Appendix
Bibliography
1. Rajarshi Sanyal, Ramjee Prasad, and Ernestina Cianca: Beyond LTE: Next Generation Multiple
Access Technology with Intelligent Lower Layers. 2011 International Conference on Wireless
Networks (July 18-21, 2011, Las Vegas, USA). Congress (http://www.world-academy-of-
science.org/).
2. Rajarshi Sanyal , Ernestina Cianca, Ramjee Prasad “Rendering Intelligence at Physical Layer for
Smart presented at IARIA conference , France, on wireless networks 2011 and published at IEEE
digital library.http://www.computer.org/portal/web/csdl/doi/10.1109/ICN.2010.16
3. Rajarshi Sanyal , Ernestina Cianca, Ramjee Prasad ,2009 World Congress Computer Science,
Computer Engineering and Applied Computing at USA : Colour Pixel Multiple Access- A
multiple Access Technology for Next Generation Mobile Networks’ at International Conference
on Wireless Networks (ICWN 09). (http://www.world-academy-of-science.org
5. Rajarshi Sanyal. July 2006 ‘ Framework for Realizing mobile and computer communication
through color signals’ in the 2006 World Congress in Computer Science , Computer Engineering
and Applied Computing in Las Vegas , USA. Ref : http://www.world-academy-of-
science.org/worldcomp06/ws/publications/sam06/authors
6. Rajarshi Sanyal, Mobile and Computer Communications Through Colour Signals - An Approach
Note. WINSYS 2006: 73-78
8. 3GPP TS 05.03 V8.9.0 (2005-01), Technical Specification Group GSM/EDGE Radio Access
Network : Channel coding.
9. 3GPP TS 23.401 General Packet Radio Service (GPRS) enhancements for Evolved Universal
Terrestrial Radio Access Network (E-UTRAN) access.
131 Bibliography
11. 3GPP TS 25.123: "Requirements for Support of Radio Resource Management (TDD)".
12. 3GPP TS 45.005 : Radio transmission and reception – GERAN based systems
13. Sanyal, R., Cianca, E. and Prasad, ‘Smart mobile networks with intelligent physical layer
actuating mobility management’, Int. J. Mobile Network Design and Innovation, 2012 Vol.4,
No.2, pp.91 – 108
14. Sanyal, R., Cianca, E. and Prasad, R 'Nano mobile network based on Smart Location Management
and Addressing', Int. J. Mobile Network Design and Innovation, Inderscience, Vol. 4, No. 3, 2012
15. Sanyal, R., Cianca, E. and Prasad, R, 'Challenges for Coexistence of Machine to Machine and
Human to Human Applications in Mobile Network: Concept of Smart Mobility Management,
International Journal of Distributed Sensor Networks, Hindawi publishers, Volume 2012 (2012),
Article ID 830371, 12 pagesdoi:10.1155/2012/830371
16. Sanyal, R., Cianca, E. and Prasad, 'Closed User Group Automotive communication network based
on addressing at physical layer', International Journal of Interdisciplinary Telecommunications
and Networking. IGI Global publishers USA, Volume 4, Issue 4. , 2012.
17. Sanyal, R., Cianca, E. and Prasad, 'Novel WLL architecture based on Colour Pixel Multiple
Access implemented on a Terrestrial Video Network as the overlay', International Journal of
Interdisciplinary Telecommunications and Networking, IGI Global publishers USA Volume 5,
Issue 1,2013.
18. Amit Kumar1; Dr. Yunfei Liu2; Dr. Jyotsna Sengupta3; Divya4; Evolution of Mobile Wireless
Communication Networks:1G to 4G, IJECT Vol. 1, Issue 1, December 2010
20. GPP TS 36.104 V8.4.0 (2008-12) Base Station Radio Transmission and Reception
21. 3GPP TS 36.331 V8.4.0 (2008-12) Radio Resource Control (RRC) Protocol Specification
23. 3GPP 23.228 Architecture and main flows for a IMS system
24. 3GPP TS 24.301: Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage
3
25. Frederic Paint, Paal Engelstad, Erik Vanem, Thomas Haslestad, Anne Mari Nordvik, Kjell
Myksvoll, Stein Svaet, “Mobility aspects in 4G Networks- White Paper”.
26. Vilmos Simon, Mobility Management Algorithms for Reducing Signalling Overhead in Next
Generation Mobile Networks: Collection of Ph.D. Theses, Department of Telecommunications
Budapest University of Technology and Economics.2008.
132 Bibliography
27. Sara Modarres Razavi, Tracking Area Planning in Cellular Networks- Optimization and
Performance Evaluation Link¨oping Studies in Science and Technology .Licentiate Thesis No.
1473
28. Claude Castelluccia , A Hierarchical Mobile IPv6 Proposal . Th`eme 1— R´eseaux et syst`emes
.Projet SIRAC .Rapport technique n ° 0226
29. EXALTED : Expanding LTE for Devices:FP7 Contract Number: 258512.European Commission
Information Society and media.
30. Gunasekaran, R.; Rhymend Uthariaraj, V.; Rajesh, R.; Kaarthikeyan, S.; Aravind, S. Priority
scheduling in mobile ad hoc networks with improved bandwidth utilization, Canadian Conference
on Electrical and Computer Engineering, 2008. CCECE 2008
31. Teena Arora, Parminder Singh,Sandeep Singh Kang, Performance Evaluation and Improving
Bandwidth Ulilization of AODV Protocol by Finding Hidden Terminals in Wireless Networks
,International Journal of Computer Science and Telecommunications [Volume 2, Issue 6,
September 2011],IEEE Conference publications
32. Unused Bandwidth in IEEE 802.16 Networks,International Journal of Electronics and Computer
Science Engineering, 2012,Volume 1,p623-631.
33. Min-Chia Chang; Been-Huang Liao , Improving bandwidth utilization of NG-SDH by dynamic
bandwidth management,Network Operations and Management Symposium (APNOMS), 2011
13th Asia-Pacific, IEEE Conference publications.
34. D-G. Jeong, and W-S. Jeon, “Time Slot Allocation in CDMA/TDD Systems for Mobile
Multimedia Services”, in Proc. of IEEE Communications letters, 4, no.2, Feb. 2000: 59-61.
35. Lin; Guan-Yu; (Caotun Township, TW) ; Wei; Hung-Yu; (Taipei City, TW) ; Chen; Yih-Shen;
(Hsinchu City, TW) ; Hsu; Chia-Chun; (Taipei City, TW) , ‘Enhanced RACH design for
machine-type communications’ . US Patent application 20120033613 , Aug 3, 2011.
36. Fei Yu and Victor Leung. Mobility-based predictive call admission control and bandwidth
reservation in wireless cellular networks. Comput. Netw., 38:577–589, April 2002.
37. Sunghyun Choi and Kang G. Shin. Predictive and adaptive bandwidth reservation for hand-offs in
qos-sensitive cellular networks. SIGCOMM Comput. Commun. Rev., 28:155–166, October 1998.
38. Guohong Cao. Integrating distributed channel allocation and adaptive handoff management for
QoS sensitive cellular networks. Wirel. Netw., 9:131–142, March 2003.
39. Kwang-Ryul Jung, Aesoon Park, and Sungwon Lee. Machine-type-communication (mtc) device
grouping algorithm for congestion avoidance of mtc oriented lte network. In Tai-hoon Kim,
Adrian Stoica, and Ruay-Shiung Chang, editors, Security-Enriched Urban Computing and Smart
Grid, volume 78 of Communications in Computer and Information Science, pages 167–178.
Springer Berlin Heidelberg, 2010. 10.1007/978-3-642-16444-6 22.
41. Haidar N. AL-Hashimi, Kamalrulnizam Abu Bakar and Kayhan Zrar Ghafoor;Inter-domain
Proxy Mobile IPv6 based Vehicular Network;Network Protocols and Algorithms;ISSN 1943-
3581;2010, Vol. 2, No. 4
133 Bibliography
43. Roberto Baldessari1, Andreas Festag, Julien Abeill; NEMO meets VANET: A Deployability
Analysis of Network Mobility in Vehicular Communication.7th International Conference on ITS
Telecommunications (ITST 2007), pages 375–380,Sophia Antipolis, France, June 2007
44. Mike Cooper, Nano Technologies for future Mobile Devices , Nokia Research Center, March
2012.
45. Rajarshi Sanyal , ‘Challenges in Interoperability and Roaming between LTE - Legacy core for
Mobility Management, Routing, Real Time Charging ‘ ITU WORLD 2011 , presented in Geneva
on 26th October 2011 , published in IEEE Explore.
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=6100941
46. 3GPP 23.228 Architecture and main flows for a IMS system. Rel 11, version 11.5.0, 2012-06-22.
47. Rich Communication Suite 5.2 Advanced Communications Services and Client Specification,
GSMA.
48. 3GPP TR 22.803 V12.2.0 (2013-06) ,Feasibility Study for Proximity Services (ProSe) , (Release
12)
50. Sanyal, R., Prasad, Enabling Cellular Device to Device Data Exchange on WISDOM 5G by
Actuating Cooperative Communication Based on SMNAT, International Journal of
Interdisciplinary Telecommunications and Networking. IGI Global publishers USA, Volume 6,
Issue 3,2014
51. Afif OSSEIRAN, Klaus DOPPLER, Cassio RIBEIRO2, Ming XIAO , Mikael SKOGLUND,
Jawad MANSSOUR, Advances in Device-to-Device Communications and Network Coding for
IMT-Advanced, ICT-MobileSummit 2009 Conference Proceedings.
52. Hyang Sin Chae, Jaheon Gu, Bum-Gon Choi, and Min Young Chung, Radio Resource Allocation
Scheme for Device-to-Device Communication in Cellular Networks Using Fractional Frequency
Reuse, 2011 17th Asia-Pacific Conference on Communications (APCC), 2nd – 5th October 2011
53. Peng Cheng ; Dept. of Electron. Eng., Shanghai Jiao Tong Univ., Shanghai, China ; Lei Deng ;
Hui Yu ; Youyun Xu Resource allocation for cognitive networks with D2D communication: An
evolutionary approach, Wireless Communications and Networking Conference (WCNC), 2012
IEEE.
54. Yueyun Chen1, Xiangyun Xu1, Qun Lei1, Joint Subcarriers and Power Allocation with Imperfect
Spectrum Sensing for Cognitive D2D Wireless Multicast, KSII transactions on internet and
information systems vol. 7, NO. 7, Jul. 2013.
56. Cornelia-Ionela Badoi , Neeli Prasad , Victor Croitoru , Ramjee Prasad, 5G Based on Cognitive
Radio, Wireless Pers Commun (2011) 57:441-464
134 Bibliography
57. Ramjee Prasad, Global ICT Standardisation Forum for India (GISFI) and 5G Standardization,
Journal of ICT Standardization,River Publishers, Vol: 1 Issue: 2, June 2013
58. Ramjee Prasad, Challenges to 5G standardization. ITU News, Issue Nº 10 December 2013
59. W. Xi, X. Li, C. Qian, J. Han KEEP: Fast Secret Key Extraction Protocol for D2D
Communication, S. Tang, K. Zhao, Proceedings of IEEE/ACM International Symposium on
Quality of Service (IWQoS), 2014.
60. Aditya Gudipati, Daniel Perry, Li Erran Li, Sachin Katti,SoftRAN: Software Defined Radio
Access Network,HotSDN '13 Proceedings of the second ACM SIGCOMM workshop on Hot
topics in software defined networking ,Pages 25-30
Appendix 1
[29]
135 Vita