Difference between revisions of "Examples of Communication Systems/General Description of UMTS"

From LNTwww
 
(15 intermediate revisions by 2 users not shown)
Line 14: Line 14:
 
⇒   In 2011  $($when this chapter was conceived$)$  about 200 million subscribers worldwide were using UMTS or similar third-generation mobile communications systems.   
 
⇒   In 2011  $($when this chapter was conceived$)$  about 200 million subscribers worldwide were using UMTS or similar third-generation mobile communications systems.   
  
⇒   In 2022  $($when this chapter was revised again as part of the English translation$)$  a global report by the network equipment industry has identified more than  hundred operators  that have either completed 3G switch-off alongside 2G switch-off,   are planning to do so or are in the process of doing so,  in order to use the spectrum this frees up for  [[Mobile_Communications/General_Information_on_the_LTE_Mobile_Communications_Standard| "$\rm LTE$"]],  $\rm 5G$  or technology-neutral.  
+
⇒   In 2022  $($when this chapter was revised again as part of the English translation$)$  a global report by the network equipment industry has identified more than  hundred operators  that have either completed 3G switch-off alongside 2G switch-off,   are planning to do so or are in the process of doing so,  in order to use the spectrum this frees up for  [[Mobile_Communications/General_Information_on_the_LTE_Mobile_Communications_Standard| "LTE"]],  "5G"  or technology-neutral.  
  
 
*28 operators in 17 countries and territories have now completed 3G switch-off.  
 
*28 operators in 17 countries and territories have now completed 3G switch-off.  
Line 22: Line 22:
 
*Another 46 operators in 31 countries have 3G shutdowns planned for the very near future.  
 
*Another 46 operators in 31 countries have 3G shutdowns planned for the very near future.  
  
*It is also interesting to note from this report that in some countries the UMTS switch-off is being pushed even harder than that of the 2G standard  [[Examples_of_Communication_Systems/General_Description_of_GSM| "$\rm GSM$"]],  which is about ten years older.
+
*It is also interesting to note from this report that in some countries the UMTS switch-off is being pushed even harder than that of the 2G standard  [[Examples_of_Communication_Systems/General_Description_of_GSM| "GSM"]],  which is about ten years older.
  
  
⇒   We have chosen to keep this chapter in our  $\rm LNTwww$  despite this negative forecast,  since understanding the underlying CDMA technology also facilitates students' understanding of other communications engineering problems. '''Korrektur''': Hier muss ich noch mit Kollegen reden.  
+
⇒   We have chosen to keep this chapter in our  $\rm LNTwww$  despite this negative forecast,  since understanding the underlying CDMA technology also facilitates students' understanding of other communications engineering problems.  
  
 
This chapter includes in detail:
 
This chapter includes in detail:
  
#»UMTS as«  a third-generation mobile communications system,
+
#»UMTS«  as a third-generation mobile communications system,
 
#the  »services and security aspects«  in UMTS,
 
#the  »services and security aspects«  in UMTS,
 
#the  »UMTS network architecture«,
 
#the  »UMTS network architecture«,
Line 201: Line 201:
 
In the UMTS radio channel,  in addition to interference from other subscribers and noise,  a number of unpredictable,  interfering and distorting effects occur,  which also change over time.  
 
In the UMTS radio channel,  in addition to interference from other subscribers and noise,  a number of unpredictable,  interfering and distorting effects occur,  which also change over time.  
  
[[File:P_ID1529__Bei_T_4_1_S5a_v2.png|right|frame|Scenario with multipath scattering]]  
+
[[File:EN_Mob_T1_1_S1.png|right|frame|Example for a mobile radio scenario|class=fit]]
Due to reflections as well as scattering and diffraction from objects,   the transmitted signal experiences multipath scattering.
+
⇒   Due to reflections as well as scattering and diffraction from objects,   the transmitted signal experiences  '''»multipath propagation«'''.
  
*The signal reaches the receiver not only via the direct path, but via several paths with different propagation times and different attenuation.
+
*The signal reaches the receiver not only via the direct path,  but via several paths with different propagation times and different attenuation.
*The multipath scattering is influenced by the environment, but additionally also by a possible movement of the subscriber, as indicated in the graph by the movement speed  $v$ .
+
 
<br clear=all>
+
*The multipath scattering is influenced by the environment,&nbsp; but additionally also by a possible movement of the user,&nbsp; as indicated in the graph by the movement speed&nbsp; $v$.
The&nbsp; '''path loss''' goes back to propagation properties of electromagnetic waves - see page&nbsp; [[Mobile_Communications/Distance_Dependent_Attenuation_and_Shading#Common_path_loss_model|"Common Path Loss Model"]]&nbsp; in the book "Mobile Communication". For the study of this attenuation phenomenon, we assume a simplified path loss model. This states:
+
 
*The received power of a radio signal decreases with distance&nbsp; $d$&nbsp; by&nbsp; $d^{-γ}$, where&nbsp; $γ$&nbsp; is a medium-dependent constant of the radio propagation wave.
+
 
*Accounting for constructive or destructive ground reflections, the constant&nbsp; $γ$&nbsp; below the&nbsp; "break point"&nbsp; $d_0$&nbsp; takes values between&nbsp; $2$&nbsp; and&nbsp; $3$&nbsp; .
+
&rArr; &nbsp; The&nbsp; '''path loss''' goes back to propagation properties of electromagnetic waves &ndash; see page&nbsp; [[Mobile_Communications/Distance_Dependent_Attenuation_and_Shading#Common_path_loss_model|"common path loss model"]]&nbsp; in the book&nbsp; "Mobile Communication".&nbsp; For the study of this attenuation phenomenon,&nbsp; we assume a simplified path loss model.&nbsp; This states:
*Above this characteristic point, the reflection effects increase and the propagation constant&nbsp; $γ$&nbsp; grows to values between&nbsp; $3.5$&nbsp; and&nbsp; $4$&nbsp;.
+
*The received power of a radio signal decreases with distance&nbsp; $d$&nbsp; by&nbsp; $d^{-γ}$,&nbsp; where&nbsp; $γ$ &nbsp; is a medium-dependent constant of the radio propagation wave.
 +
 
 +
*Accounting for constructive or destructive ground reflections,&nbsp; the constant&nbsp; $γ$ &nbsp; below the&nbsp; "break point"&nbsp; $d_0$&nbsp; takes values between&nbsp; $2$&nbsp; and&nbsp; $3$.
 +
 
 +
*Above this characteristic point,&nbsp; the reflection effects increase and the propagation constant&nbsp; $γ$ &nbsp; grows to values between&nbsp; $3.5$&nbsp; and&nbsp; $4$.
  
  
[[File:EN_Bei_T_4_1_S2_neu.png|right|frame|Path loss (attenuation) as a function of distance]]
+
{{GraueBox|TEXT=  
{{GraueBox|TEXT=
 
 
$\text{Example 1:}$&nbsp;
 
$\text{Example 1:}$&nbsp;
Shown on the right is the path loss (in dB) as a function of distance&nbsp; $d$. In this example, the constant&nbsp; $α_0 = 10^{-5}$&nbsp; $($also&nbsp; $50 \ \rm dB)$&nbsp; is set and the break point is at&nbsp; $d_0 = \ \rm 100 \ m$.
+
Shown on the right is the path loss&nbsp; $($in dB$)$&nbsp; as a function of the distance&nbsp; $d$&nbsp; $($in meter$)$.
*In the left-hand range&nbsp; $(d \ll d_0)$&nbsp; $γ \approx 2$ holds.
+
[[File:EN_Bei_T_4_1_S2_neu.png|right|frame|Path loss&nbsp; $($attenuation$)$&nbsp; as a function of the distance]]
*For&nbsp; $d \gg d_0$&nbsp; on the other hand&nbsp; $γ \approx 4$.  
+
In this example,  
*In the region around&nbsp; $d = d_0$&nbsp; the propagation constant increases continuously from&nbsp; $γ = 2$&nbsp; to&nbsp; $γ = 4$&nbsp;. }}
+
*the constant&nbsp; $α_0 = 10^{-5}$&nbsp; is set &nbsp; &rArr; &nbsp; $10 \cdot \lg \ α_0 = 50 \ \rm dB$,
 +
 
 +
*the break point is at&nbsp; $d_0 = \ \rm 100 \ m$.
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
 
 +
One can see from the graph:
 +
#In the left-hand range&nbsp; $(d \ll d_0)$&nbsp;  holds&nbsp; $γ \approx 2$<br><br>
 +
#For&nbsp; $d \gg d_0$&nbsp; on the other hand:&nbsp; $γ \approx 4$.<br><br>
 +
#In the region around&nbsp; $d = d_0$:&nbsp; <br>The propagation constant increases continuously from&nbsp; $γ = 2$ &nbsp; to&nbsp; $γ = 4$. }}
 
 
 
 
  
==Frequency&ndash; and time&ndash;selective fading==   
+
==Frequency&ndash;selective and time&ndash;selective fading==   
 
<br>
 
<br>
An essential property of the mobile radio channel is the so-called &nbsp; '''fading'''&nbsp;. This is caused by time-varying shadowing and by possible movements of the mobile subscriber.
+
An essential property of the mobile radio channel is the so-called &nbsp; '''&raquo;fading&laquo;'''.&nbsp; This is caused by time-varying shadowing and by possible movements of the mobile subscriber.&nbsp; In the book&nbsp; "[[Mobile_Communications/Probability_Density_of_Rayleigh_Fading#Frequency-selective_fading_vs._non-frequency-selective_fading|Mobile Communications]]"&nbsp; this type of signal degradation is discussed in detail.  
  
In the book&nbsp; "[[Mobile Communications]]"&nbsp; this type of signal degradation is discussed in detail.  
+
Here follows only a brief summary.&nbsp; One distinguishes on the one hand:
 +
*'''&raquo;Short term fading&laquo;'''&nbsp; or&nbsp; "fast fading"&nbsp; &nbsp; &rArr; &nbsp; short term drops  in the received power &nbsp; $($mostly in the microseconds range$)$.
  
Here follows only a brief summary. One distinguishes on the one hand:
+
*'''&raquo;Long term fading&laquo;'''&nbsp; or&nbsp; "slow fading" &nbsp; &rArr; &nbsp; only slow changes&nbsp; $($mostly in the seconds range$)$.
*''Fast fading'' or ''short term fading''&nbsp; with short term drops in received power in the microsecond range,
 
*''Long term fading'' - i.e. only slow changes (mostly) in the seconds range.
 
  
 +
::Fast fading mainly affects systems with large symbol durations,&nbsp; i.e.&nbsp; small bandwidths.&nbsp; However,&nbsp; since the bandwidth of UMTS is much larger than that of GSM,&nbsp; this system is less susceptible to fast fading.
  
Fast fading mainly affects systems with large symbol durations, i.e. small bandwidths. However, since the bandwidth of UMTS is much larger than that of GSM, this system is less susceptible to fast fading.
+
Furthermore,&nbsp; fading can also be classified as follows:
 +
*'''&raquo;Frequency-selective fading&laquo;'''&nbsp; is caused by multipath propagation over paths with different delay times. <br> &nbsp; &nbsp; As a result of this fading,&nbsp; different frequency components are attenuated differently by the power transfer function&nbsp; $|H_{\rm K}(f)|^2$&nbsp; of the channel.
  
Furthermore, fading can also be classified as follows:
+
*'''&raquo;Time-selective fading&laquo;'''&nbsp; occurs due to a relative motion between transmitter and receiver. <br> &nbsp; &nbsp;  This causes frequency shifts depending on the direction of movement&nbsp; $($towards or away from the transmitter$)$&nbsp; which are physically described by the&nbsp; [[Mobile_Communications/Statistical_Bindings_within_the_Rayleigh_Process#Phenomenological_description_of_the_Doppler_effect|"Doppler effect"]].
*'''Frequency selective fading'''&nbsp; is caused by multipath scattering over paths with different delay times. As a result of this fading, different frequency components are attenuated differently by the power transfer function&nbsp; $|H_{\rm K}(f)|^2$&nbsp; of the channel.
 
*'''Time selective fading'''&nbsp; occurs due to a relative motion between transmitter and receiver. This causes frequency shifts depending on the direction of movement&nbsp; (towards or away from the transmitter)&nbsp; which are physically described by the&nbsp; ''Doppler effect''&nbsp;.
 
  
 +
::The fading characteristics&nbsp; "frequency selective"&nbsp; and&nbsp; "time selective"&nbsp; shall now be explained in more detail,&nbsp; in particular it will be explained under which conditions which of these fading types are to be expected.&nbsp; At this point we also refer to two e-learning tools:
 +
::# HTML5/JavaScript applet&nbsp; [[Applets:The_Doppler_Effect|"The Doppler effect"]],
 +
::# German language SWF applet&nbsp; [[Applets:Multipath_propagation_and_frequency_selectivity_(Applet)|"Multipath propagation and frequency selectivity"]].
  
The fading characteristics&nbsp; "frequency selective"&nbsp; and&nbsp; "time selective"&nbsp; shall now be explained in more detail, in particular it will be explained under which conditions which of these fading types are to be expected. At this point we also refer to the two interactive applets
+
{{BlaueBox|TEXT= 
:: [[Applets:Multipath_propagation_and_frequency_selectivity_(Applet)|"Multipath propagation and frequency selectivity"]]&nbsp; and
+
$\text{Characteristics of frequency-selective fading:}$&nbsp;
:: [[Applets:To_illustrate_the_Doppler_effect_(Applet)|"To illustrate the Doppler effect"]].
+
*Receiving different scattering components with different delay times results in a&nbsp; '''&raquo;delay spread&laquo;'''&nbsp;  $T_{\rm V}$, defined as the difference between maximum and minimum delay times&nbsp; $($ German:&nbsp; "Verzögerungszeiten &nbsp; &rArr; &nbsp; subscript "V"$)$.&nbsp; The inverse of this gives approximately the&nbsp; '''&raquo;coherence bandwidth&laquo;'''&nbsp; $B_{\rm K}$.
  
{{BlaueBox|TEXT= 
+
*It is called&nbsp; "frequency-selective fading"&nbsp; if the coherence bandwidth&nbsp; $B_{\rm K}$&nbsp; is much smaller than the signal bandwidth&nbsp; $B_{\rm S}$.&nbsp; As a result,&nbsp; different frequency components are attenuated differently by the channel,&nbsp; resulting in linear distortions.}}
$\text{Characteristics of frequency selective fading:}$&nbsp;
 
*Receiving different scattering components with different delay times results in a&nbsp; '''delay spread'''&nbsp;  $T_{\rm V}$, defined as the difference between maximum and minimum delay times. The inverse of this gives approximately the coherence bandwidth&nbsp; $B_{\rm K}$.
 
*It is called&nbsp; ''frequency selective fading'' if the coherence bandwidth&nbsp; $B_{\rm K}$&nbsp; is much smaller than the signal bandwidth&nbsp; $B_{\rm S}$. As a result, different frequency components are attenuated differently by the channel, resulting in linear distortion}}
 
  
  
 
{{BlueBox|TEXT=   
 
{{BlueBox|TEXT=   
 
$\text{Characteristics of time-selective fading:}$&nbsp;  
 
$\text{Characteristics of time-selective fading:}$&nbsp;  
*In time-selective fading, a so-called&nbsp; '''Doppler spread'''&nbsp; $B_{\rm D}$ occurs, which is defined as the difference between the maximum and minimum Doppler frequencies occurring.  
+
*In&nbsp; "time-selective fading",&nbsp;  a so-called&nbsp; '''&raquo;Doppler spread&laquo;'''&nbsp; $B_{\rm D}$&raquo; occurs,&nbsp; which is defined as the difference between maximum and minimum Doppler frequencies.
*The reciprocal of which is called the&nbsp; ''correlation duration''&nbsp; '''Korrektur''': besser correlation time? $T_{\rm D} = {1}/{B_{\rm D} }$. In some literatures, this quantity is also referred to as&nbsp; ''coherence time''&nbsp; . In UMTS,&nbsp; ''time-selective fading''&nbsp; occurs whenever the&nbsp; ''correlation duration''&nbsp; $T_{\rm D}$&nbsp; is much smaller than the chip duration&nbsp; $T_{\rm C}$.}}  
+
 +
*The reciprocal of which is called the&nbsp; "correlation time"&nbsp; $T_{\rm D} = {1}/{B_{\rm D} }$.&nbsp; In some literatures,&nbsp; this quantity is also referred to as&nbsp; "coherence time".&nbsp; In UMTS,&nbsp; "time-selective fading"&nbsp; occurs whenever the correlation time&nbsp; $T_{\rm D}$&nbsp; is much smaller than the chip duration&nbsp; $T_{\rm C}$.}}  
  
  
 
{{GraueBox|TEXT=  
 
{{GraueBox|TEXT=  
 
$\text{Example 2:}$&nbsp;
 
$\text{Example 2:}$&nbsp;
The left graph illustrates the difference between frequency selective and non-frequency selective fading:
+
The left graph illustrates the difference between frequency-selective and non-frequency-selective fading:
[[File:EN_Bei_T_4_1_S7.png|right|frame|The red curves illustrate frequency-selective and time-selective fading]]  
+
[[File:EN_Bei_T_4_1_S7_v3.png|right|frame|The red curves illustrate frequency-selective and time-selective fading]]  
*The power transfer function&nbsp; $\vert H_{\rm K}(f, t)\vert ^2$&nbsp; of the channel at a fixed time&nbsp; $t$ is shown.  
+
#Shown in this graph is the logarithm power transfer function&nbsp; $\vert H_{\rm K}(f,\ t)\vert ^2$&nbsp; of the channel at a fixed time&nbsp; $t$.  
*While non-frequency selective fading is plotted in blue with&nbsp; $-5 \ \rm dB$&nbsp;, the red curve in the left graph shows an example of frequency selective fading.
+
#While non-frequency-selective fading is plotted in blue with&nbsp; $-5 \ \rm dB$&nbsp;, the red curve shows an example of frequency-selective fading.
*Different frequency components are thereby attenuated differently.
+
#Different frequency components are thereby attenuated differently.
  
  
  
The right graph schematically shows time-selective fading:  
+
The right graph shows schematically&nbsp; "time-selective fading":  
*The power transfer function&nbsp; $\vert H_{\rm K}(f, t) \vert ^2$&nbsp; of the channel for a fixed frequency&nbsp; $f$ is plotted here.  
+
#Here,&nbsp; the power transfer function&nbsp; $\vert H_{\rm K}(f,\ t) \vert ^2$&nbsp; of the channel for a fixed frequency&nbsp; $f$ is plotted.  
*The blue curve is valid for non-time-selective fading: &nbsp;At any time the signal is attenuated by&nbsp; $5 \rm dB$&nbsp;. }}
+
#The blue curve is valid for non-time-selective fading: &nbsp;At any time the signal is attenuated by&nbsp; $5 \rm dB$&nbsp;. }}
 
 
 
 
  
 
==UMTS services ==
 
==UMTS services ==
 
<br>
 
<br>
One of the goals of the introduction of UMTS is to expand and diversify the mobile communications services offered. A UMTS-capable terminal must support a number of more complex multimedia applications and functions in addition to the classic services (voice transmission, messaging, etc.).
+
One of the goals of the introduction of UMTS is to expand and diversify the mobile communications services offered.&nbsp; A UMTS capable terminal must support a number of more complex multimedia applications and functions in addition to the classic services&nbsp; $($speech transmission,&nbsp; messaging, ...$)$.
  
These services can be divided into six main categories, depending on the application:
+
These services can be divided into six main categories,&nbsp; depending on the application:
*''Information''&nbsp;: &nbsp; Internet surfing (''info-on-demand''), online print media,
+
#'''Information'''&nbsp;: &nbsp; Internet surfing&nbsp; $($info-on-demand$)$,&nbsp; online print media,
*''Communication''&nbsp;: &nbsp; video and audio conferencing, fax, ISDN, messaging,
+
#'''Communication''': &nbsp; Video and audio conferencing,&nbsp; fax,&nbsp; ISDN,&nbsp; messaging,
*''Entertainment''&nbsp;: &nbsp; mobile TV, mobile radio, video-on-demand, online gaming,
+
#'''Entertainment''': &nbsp; Mobile TV,&nbsp; mobile radio,&nbsp; video-on-demand,&nbsp; online gaming,
*''Business''&nbsp;: &nbsp; Interactive shopping, e-commerce,
+
#'''Business''': &nbsp; Interactive shopping,&nbsp; e-commerce,
*''Technical area''&nbsp;: &nbsp; Online support, Distribution service (speech and data),
+
#'''Technical area''': &nbsp; Online support,&nbsp; distribution service&nbsp; $($speech and data$)$,
*''Medical area''&nbsp;: &nbsp; Telemedicine.
+
#'''Medical area''': &nbsp; Telemedicine.
  
  
[[File:P_ID1484__Bei_T_4_1_S9_v1.png|Right|frame|Compilation and classification of UMTS services]]
 
{{GraueBox|TEXT= 
 
$\text{Example 3:}$&nbsp; In the figure, UMTS&ndash;services are classified according to different characteristics:
 
#by data rate in vertical direction,
 
#by type of connection (bidirectional, unidirectional, broadcast) in horizontal direction.
 
  
'''Grafik weg!!!'''
 
 
 
''Notes:''
 
*The height of a box indicates (approximately) the range for the required data rate.
 
*The width approximately indicates the data range.}}
 
 
   
 
   
  
 
==Security aspects==  
 
==Security aspects==  
 
<br>
 
<br>
The security features in UMTS networks are based on the same principles as in GSM. However, some GSM security features have been removed, replaced or expanded. This has made  
+
The security features in UMTS networks are based on the same principles as in GSM.&nbsp; However,&nbsp; some GSM security features have been removed,&nbsp; replaced or expanded.  
*the encryption algorithms more robust,  
+
 
*the authentication algorithms more stringent, and  
+
This has made  
*the subscriber confidentiality criteria tighter.
+
#the encryption algorithms more robust,  
 +
#the authentication algorithms more stringent,&nbsp; and  
 +
#the subscriber confidentiality criteria tighter.
  
  
 
The main security standards adopted from GSM in UMTS are:
 
The main security standards adopted from GSM in UMTS are:
#&nbsp;Subscriber authentication,
+
#&nbsp;subscriber authentication,
#&nbsp;Confidentiality of the subscriber identity,
+
#&nbsp;confidentiality of the subscriber identity,
#&nbsp;Encryption of the radio interface.
+
#&nbsp;encryption of the radio interface.
  
  
 
In addition to these, other security measures have been observed in UMTS:
 
In addition to these, other security measures have been observed in UMTS:
 
#&nbsp;Mutual authentication to avoid the use of false base stations,
 
#&nbsp;Mutual authentication to avoid the use of false base stations,
#&nbsp;Encryption of the connection between base station and associated control node,
+
#&nbsp;encryption of the connection between base station and associated control node,
#&nbsp;Encryption and authentication of security data during transmission,
+
#&nbsp;encryption and authentication of security data during transmission,
#&nbsp;Mechanisms for updating the security features.
+
#&nbsp;mechanisms for updating the security features.
 +
[[File:EN_Bei_T_4_1_S10_v2.png|right|frame|Compilation of security measures in UMTS]]
 +
 
 +
 
  
 +
One can classify the above security measures according to the graph.&nbsp; A distinction is made between security concepts for
 +
*the&nbsp; '''&raquo;Network Access Security&laquo;'''&nbsp; for each subscriber,
  
One can classify the above security measures according to the graph.
+
*the&nbsp; '''&raquo;User Domain Security&nbsp;&laquo;'''&nbsp; &ndash; access to terminal equipment is ensured,
  
[[File:EN_Bei_T_4_1_S10.png|right|frame|Compilation of security measures in UMTS]]
+
*the&nbsp; '''&raquo;Network Domain Security&laquo;'''&nbsp; &ndash; a secure exchange of control data between nodes within the network domain is ensured,
A distinction is made between security concepts for
 
*the '''Network Access Security''' for each subscriber,
 
  
*the '''Network Domain Security''' - a secure exchange of control data between nodes within the network domain is ensured,
+
*the&nbsp; '''&raquo;Application Domain Security&laquo;'''&nbsp; &ndash; the secure exchange between applications of the subscriber terminals and the network providers is guaranteed.
  
*the '''User Domain Security''' - access to terminal equipment is ensured,
+
 
*the '''Application Domain Security '''- the secure exchange between applications of the subscriber terminals and the network providers is guaranteed.
+
The UMTS subscriber can see at any time which of these security measures are in operation and which of them are required for specific services.&nbsp; In this context,&nbsp; one speaks of&nbsp; "Visibility and Configurability Security".
<br clear=all>
 
The UMTS subscriber can see at any time which of these security measures are in operation and which of them are required for specific services. In this context, one speaks of ''visibility'' and ''configurability'' of security.
 
  
 
 
 
 
 
==Exercises for the chapter==
 
==Exercises for the chapter==
 
<br>  
 
<br>  
[[Aufgaben:Exercise_4.1:_Different_Duplex_Methods_for_UMTS|"Exercise 4.1: Different Duplex Methods for UMTS"]]
+
[[Aufgaben:Exercise_4.1:_Different_Duplex_Methods_for_UMTS|Exercise 4.1: Different Duplex Methods for UMTS]]
  
[[Aufgaben:Exercise_4.2:_UMTS_Radio_Channel_Basics|"Exercise 4.2: UMTS Radio Channel Basics"]]
+
[[Aufgaben:Exercise_4.2:_UMTS_Radio_Channel_Basics|Exercise 4.2: UMTS Radio Channel Basics]]
  
  
 
{{Display}}
 
{{Display}}

Latest revision as of 14:00, 13 March 2023

# OVERVIEW OF THE FOURTH MAIN CHAPTER #


$\rm U$niversal  $\rm M$obile  $\rm T$elecommunications  $\rm S$ystem  $\rm (UMTS)$  is a third-generation mobile communications system,  which,  when it was introduced,  was intended to be a forward-looking alternative to the mobile communications systems used until then.  Compared with GSM,  UMTS not only offers higher-quality speech,  but also a variety of enhanced services and functionalities thanks to its faster and packet-switched transmission.

UMTS was standardized in the late 1990s as part of a collaboration between the  "International Telecommunication Union"  $\rm (ITU)$  and the 3GPP Forum  $($"3rd Generation Partnership Project"$)$  and has been commercially available in Europe since 2004.

⇒   In 2011  $($when this chapter was conceived$)$  about 200 million subscribers worldwide were using UMTS or similar third-generation mobile communications systems.

⇒   In 2022  $($when this chapter was revised again as part of the English translation$)$  a global report by the network equipment industry has identified more than hundred operators  that have either completed 3G switch-off alongside 2G switch-off,   are planning to do so or are in the process of doing so,  in order to use the spectrum this frees up for  "LTE",  "5G"  or technology-neutral.

  • 28 operators in 17 countries and territories have now completed 3G switch-off.
  • Six operators in six countries and territories currently have 3G switch-off underway.
  • Another 46 operators in 31 countries have 3G shutdowns planned for the very near future.
  • It is also interesting to note from this report that in some countries the UMTS switch-off is being pushed even harder than that of the 2G standard  "GSM",  which is about ten years older.


⇒   We have chosen to keep this chapter in our  $\rm LNTwww$  despite this negative forecast,  since understanding the underlying CDMA technology also facilitates students' understanding of other communications engineering problems.

This chapter includes in detail:

  1. »UMTS«  as a third-generation mobile communications system,
  2. the  »services and security aspects«  in UMTS,
  3. the  »UMTS network architecture«,
  4. the  »physical, logical and transport channels«  and their interactions,
  5. the  »cellular architecture in UMTS«  and its mechanisms,
  6. the  »speech and channel coding«  used in UMTS,
  7. the  »band spreading and CDMA«  as the basis of UMTS,
  8. the  »radio resource management and power control«  in UMTS networks,
  9. the  »further developments of UMTS«  such as  »HSDPA«  and  »HSUPA«,
  10. an outlook on  »Long Term Evolution«  $\rm (LTE)$,  the buzzword of the fourth generation.


Requirements for third–generation mobile communications systems


The main motivation for the development of  »third-generation mobile communications systems«  was the realization that second-generation systems could not satisfy the bandwidth requirements for the use of multimedia services.

Development of mobile communications systems from 1995 to 2006

The graph shows the development of mobile radio systems since 1995 in terms of performance or data transmission rate as seen in 2007:

  • The specified data rates for HSUPA  $($uplink,  up to  $\text{3 Mbit/s)}$  and HSDPA  $($downlink,  up to  $\text{7 Mbit/s)}$  were realistic for 2006/2007.
  • In contrast,  the specifications stated maximum values for the uplink  $\text{5.8 Mbit/s}$  and for the downlink  $\text{14.4 Mbit/s}$ $($i.e., significantly higher maximum values$)$,  but these will probably not be achievable in practice.
  • The third-generation mobile communications systems were to have greater bandwidth than the  "GSM"  already established at that time and sufficient reserve capacity to ensure high quality of service even in the face of constantly growing demands.
  • In the development of the 3G systems,  the  "International Telecommunication Union"  $\rm (ITU)$  has played an important role.  Among other things,  it created a catalog of requirements that defined their characteristics.


This catalog of requirements includes the following general conditions:

  1. High data rates from  $\text{144 kbit/s}$  $($standard$)$  to  $\text{2 Mbit/s}$  $($in-door$)$,
  2. symmetric and asymmetric data transmission  $($IP services$)$,
  3. circuit-switched and packet-switched transmission,
  4. high speech quality and high spectral efficiency,
  5. seamless transition to and from second-generation systems,
  6. global reachability and distribution,
  7. applications independent of the network used $($virtual home environment$)$.


The IMT–2000 standard


In 1992,  the  "International Telecommuncation Union"  $\rm (ITU)$  launched the  $\text{IMT-2000}$  $($"International Mobile Telecommunications at  2000 MHz"$)$  standard to enable the above requirements.  This comprises a number of different third-generation mobile communications systems that have been converged during the standardization process to enable the development of common terminals for all these standards.

In order to take into account nationally different preliminary work and to allow network operators to continue using existing network architectures to some extent, 

The "IMT family" – an overview

IMT–2000 includes several individual standards.  These can be roughly divided into four categories:

  • $\rm W\hspace{-0.12cm}-\hspace{-0.08cm}CDMA$:   This includes the FDD component of the European UMTS standard as well as the American  "cdma2000"  system.
  • $\rm TD\hspace{-0.08cm}-\hspace{-0.08cm}CDMA$:   This group includes the TDD component of UMTS as well as the Chinese  "TD-SCDMA",  which is now integrated into the  "UMTS–TDD"  standard.
  • $\rm TDMA$:   A further development of the GSM off-shoot  "EDGE"  and its American counterpart  "UWC-136",  also known as  "DS-AMPS".
  • $\rm FD\hspace{-0.08cm}-\hspace{-0.08cm}CDMA$:   The further development of the European cordless telephony standard  $\rm DECT$  $($"Digital Enhanced Cordless Telecommunication"$)$.


In the following,   we focus on the European-developed system  $\rm UMTS$  $($"Universal Mobile Telecommunications System"$)$,   which supports the first two standards  "$\rm W\hspace{-0.12cm}-\hspace{-0.08cm}CDMA$"  and  "$\rm TD\hspace{-0.08cm}-\hspace{-0.08cm}CDMA$"  of the  IMT–2000  system family.


Historical development of UMTS


The following is some data on the historical development of UMTS and the techniques used.  More information can be found,  for example,  at this "internet link".

  • 1940-1950   First military applications of signal spreading techniques.
  • 1949   First outlines of the CDMA process by C. E. Shannon and J. R. Pierce.
  • 1970   Various CDMA developments for military systems, e.g. GPS.
  • 1989-1992   Basic research on the characteristics of future mobile radio systems within the EU program RACE-1  $($Research,  Analysis,  Communication,  Evaluation$)$.
  • 1992   First consideration of the IMT-2000 standard by the ITU.
  • 1992-1995   EU program RACE-2 focusing on "development of system concepts" - based on the results of RACE-1.
  • 1996   Foundation of the UMTS Forum in Zurich - renaming of the planned European standard  "W-CDMA"  to  "UMTS".
  • 1998   Adoption of the two modes  "W-CDMA"  and  "TD-CDMA" ' into the UMTS standard at the ETSI-SMG meeting in Paris.
  • 1998   Establishment of the  "3gpp forum"  $($"3rd Generation Partnership Project"$)$  by the ETSI-SMG,  T1P1,  ARIB TTC  and  TTA committees.
  • 1999   Adoption of the UMTS-R99 standard $($Release 1999$)$  by ETSI.  This is considered the basis for the first available UMTS terminals.
  • 2001  Adoption of Release 4 as a further development of UMTS-R99:  "Quality of Service"  $\rm (QoS)$  is now supported at the radio interface and in the fixed network.
  • 2001   First commercial UMTS network of the Norwegian company  "TELENOR".
  • 2002   Adoption of UMTS Release 5:   Architecture based on the GSM fixed network is replaced by a fully IP-based fixed network.
  • 2002   First UMTS speech and data link from  "Nortel Networks"  and  "Qualcomm".  These companies are considered pioneers in the implementation of UMTS.
  • 2004   Adoption of UMTS Release 6,  a standard that provides improved QoS for the user and more effective resource management for the provider.


With UMTS, too,  more than a decade has passed between the first conceptual considerations and the final introduction.

This was similar to the introduction of other communications systems,  such as

  • "ISDN"  $($"Integrated Services Digital Network"$)$,
  • "DSL"  $($"'Digital Subscriber Line"$)$,
  • "GSM"  $($"Global System for Mobile Communications"$)$.


Frequency allocation for UMTS


The  International Telecommunication Union  $\rm (ITU)$  is responsible for allocating bandwidths and frequency bands for communications systems.  In the case of UMTS in particular,  however,  there are discrepancies between the European and ITU frequency allocations,  as some frequency bands were already occupied by other mobile communications systems in some countries. 

UMTS frequency spectra

The graph shows the European  $($bottom$)$  and the ITU frequency assignments  $($top$)$.  Meaning:

$\rm GSM \ 1800$:
Frequency band for the downlink of GSM 1800,

$\rm SAT$:
Satellite-based systems   $($each  $\text{30 MHz}$  for uplink and downlink$)$,

$\rm DECT$:
Digital Enhanced Cordless Telecommunications,

$\rm UTRA\:FDD$,   for short:   $\rm FDD$:
UMTS Terrestrial Radio Access  –  Frequency Division Duplex,

$\rm UTRA\:TDD$,   for short:   $\rm TDD$:
UMTS Terrestrial Radio Access  –  Time Division Duplex.


Note:

⇒   $\rm FDD$  consists of twelve paired uplink and downlink frequency bands of  $\text{5 MHz}$  bandwidth each. The frequency bands are located in Europe between

  •   $\text{1920 MHz}$  and  $\text{1980 MHz}$  in the uplink,
  •   $\text{2110 MHz}$  and  $\text{2170 MHz}$  in the downlink.


⇒   $\rm TDD$  consists of five frequency bands of  $\text{5 MHz}$  bandwidth each,  in which both uplink and downlink data are to be transmitted using time division multiplexing.

  • The TDD band lies between  $\text{1900 MHz}$  and  $\text{1920 MHz}$  $($four channels$)$  and between  $\text{2020 MHz}$  and  $\text{2025 MHz}$  $($one channel$)$.
  • The band between  $\text{2010 MHz}$  and  $\text{2020 MHz}$  has not been licensed in 2007.


Full duplex


In order to separate the two transmission directions uplink and downlink,  two different operating modes are supported in UMTS.  A distinction is made between:

»UMTS Terrestrial Radio Access Frequency Division Duplex«  $\rm (UTRA\hspace{-0.08cm}-\hspace{-0.08cm}FDD)$,
»UMTS Terrestrial Radio Access Time Division Duplex«  $\rm (UTRA\hspace{-0.08cm}-\hspace{-0.08cm}TDD)$,

  • The main difference between these two modes can be seen in the physical layer of the protocol stack.
  • The two methods differ in both their duplex and multiple access methods.


UTRA-FDD mode in UMTS

In the   $\rm UTRA\hspace{-0.08cm}-\hspace{-0.08cm}FDD$  mode,  as shown in the graph on the right:

  1. Uplink and downlink data are transmitted simultaneously on different but corresponding paired  $\text{5 MHz}$  frequency blocks.
  2. Data from different subscribers are transmitted and received on the same frequency band.
  3. The use of different CDMA spreading codes enables the separation of the respective subscriber data.
  4. The  TDMA method  is also used to realize periodic functions such as power control.
  5. The  FDMA method  can be used in addition to CDMA and TDMA if the network operator has more than one frequency channel.


FDD mode is used only in Europe and mostly only for symmetrical services whose bandwidth requirements in the uplink and downlink are approximately the same.  This is the case for speech communications or video telephony,  for example.


UTRA TDD mode in UMTS

In the   $\rm UTRA\hspace{-0.08cm}-\hspace{-0.08cm}TDD$  mode,  uplink and downlink data are transmitted in the same frequency band.  In this case,  uplink and downlink are separated in time,  as shown in the following diagram. Furthermore:

  1. The  "switching point"  can be flexibly selected depending on the data volume ratio between uplink and downlink.
  2. In TDD mode,  the subscribers are identified both by the spreading code  $($as in FDD$)$  and by the time slot.
  3. If the network operator has several frequency channels,  FDMA can be used in addition to CDMA and TDMA as with FDD.


TDD mode was 2007 not used in Europe and,  once introduced,  will mainly be used for asymmetric services  where the data volumes of downlink and uplink differ significantly.

Properties of the UMTS radio channel


In the UMTS radio channel,  in addition to interference from other subscribers and noise,  a number of unpredictable,  interfering and distorting effects occur,  which also change over time.

Example for a mobile radio scenario

⇒   Due to reflections as well as scattering and diffraction from objects,  the transmitted signal experiences  »multipath propagation«.

  • The signal reaches the receiver not only via the direct path,  but via several paths with different propagation times and different attenuation.
  • The multipath scattering is influenced by the environment,  but additionally also by a possible movement of the user,  as indicated in the graph by the movement speed  $v$.


⇒   The  path loss goes back to propagation properties of electromagnetic waves – see page  "common path loss model"  in the book  "Mobile Communication".  For the study of this attenuation phenomenon,  we assume a simplified path loss model.  This states:

  • The received power of a radio signal decreases with distance  $d$  by  $d^{-γ}$,  where  $γ$   is a medium-dependent constant of the radio propagation wave.
  • Accounting for constructive or destructive ground reflections,  the constant  $γ$   below the  "break point"  $d_0$  takes values between  $2$  and  $3$.
  • Above this characteristic point,  the reflection effects increase and the propagation constant  $γ$   grows to values between  $3.5$  and  $4$.


$\text{Example 1:}$  Shown on the right is the path loss  $($in dB$)$  as a function of the distance  $d$  $($in meter$)$.

Path loss  $($attenuation$)$  as a function of the distance

In this example,

  • the constant  $α_0 = 10^{-5}$  is set   ⇒   $10 \cdot \lg \ α_0 = 50 \ \rm dB$,
  • the break point is at  $d_0 = \ \rm 100 \ m$.





One can see from the graph:

  1. In the left-hand range  $(d \ll d_0)$  holds  $γ \approx 2$

  2. For  $d \gg d_0$  on the other hand:  $γ \approx 4$.

  3. In the region around  $d = d_0$: 
    The propagation constant increases continuously from  $γ = 2$   to  $γ = 4$.


Frequency–selective and time–selective fading


An essential property of the mobile radio channel is the so-called   »fading«.  This is caused by time-varying shadowing and by possible movements of the mobile subscriber.  In the book  "Mobile Communications"  this type of signal degradation is discussed in detail.

Here follows only a brief summary.  One distinguishes on the one hand:

  • »Short term fading«  or  "fast fading"    ⇒   short term drops in the received power   $($mostly in the microseconds range$)$.
  • »Long term fading«  or  "slow fading"   ⇒   only slow changes  $($mostly in the seconds range$)$.
Fast fading mainly affects systems with large symbol durations,  i.e.  small bandwidths.  However,  since the bandwidth of UMTS is much larger than that of GSM,  this system is less susceptible to fast fading.

Furthermore,  fading can also be classified as follows:

  • »Frequency-selective fading«  is caused by multipath propagation over paths with different delay times.
        As a result of this fading,  different frequency components are attenuated differently by the power transfer function  $|H_{\rm K}(f)|^2$  of the channel.
  • »Time-selective fading«  occurs due to a relative motion between transmitter and receiver.
        This causes frequency shifts depending on the direction of movement  $($towards or away from the transmitter$)$  which are physically described by the  "Doppler effect".
The fading characteristics  "frequency selective"  and  "time selective"  shall now be explained in more detail,  in particular it will be explained under which conditions which of these fading types are to be expected.  At this point we also refer to two e-learning tools:
  1. HTML5/JavaScript applet  "The Doppler effect",
  2. German language SWF applet  "Multipath propagation and frequency selectivity".

$\text{Characteristics of frequency-selective fading:}$ 

  • Receiving different scattering components with different delay times results in a  »delay spread«  $T_{\rm V}$, defined as the difference between maximum and minimum delay times  $($ German:  "Verzögerungszeiten   ⇒   subscript "V"$)$.  The inverse of this gives approximately the  »coherence bandwidth«  $B_{\rm K}$.
  • It is called  "frequency-selective fading"  if the coherence bandwidth  $B_{\rm K}$  is much smaller than the signal bandwidth  $B_{\rm S}$.  As a result,  different frequency components are attenuated differently by the channel,  resulting in linear distortions.


$\text{Characteristics of time-selective fading:}$ 

  • In  "time-selective fading",  a so-called  »Doppler spread«  $B_{\rm D}$» occurs,  which is defined as the difference between maximum and minimum Doppler frequencies.
  • The reciprocal of which is called the  "correlation time"  $T_{\rm D} = {1}/{B_{\rm D} }$.  In some literatures,  this quantity is also referred to as  "coherence time".  In UMTS,  "time-selective fading"  occurs whenever the correlation time  $T_{\rm D}$  is much smaller than the chip duration  $T_{\rm C}$.


$\text{Example 2:}$  The left graph illustrates the difference between frequency-selective and non-frequency-selective fading:

The red curves illustrate frequency-selective and time-selective fading
  1. Shown in this graph is the logarithm power transfer function  $\vert H_{\rm K}(f,\ t)\vert ^2$  of the channel at a fixed time  $t$.
  2. While non-frequency-selective fading is plotted in blue with  $-5 \ \rm dB$ , the red curve shows an example of frequency-selective fading.
  3. Different frequency components are thereby attenuated differently.


The right graph shows schematically  "time-selective fading":

  1. Here,  the power transfer function  $\vert H_{\rm K}(f,\ t) \vert ^2$  of the channel for a fixed frequency  $f$ is plotted.
  2. The blue curve is valid for non-time-selective fading:  At any time the signal is attenuated by  $5 \rm dB$ .


UMTS services


One of the goals of the introduction of UMTS is to expand and diversify the mobile communications services offered.  A UMTS capable terminal must support a number of more complex multimedia applications and functions in addition to the classic services  $($speech transmission,  messaging, ...$)$.

These services can be divided into six main categories,  depending on the application:

  1. Information :   Internet surfing  $($info-on-demand$)$,  online print media,
  2. Communication:   Video and audio conferencing,  fax,  ISDN,  messaging,
  3. Entertainment:   Mobile TV,  mobile radio,  video-on-demand,  online gaming,
  4. Business:   Interactive shopping,  e-commerce,
  5. Technical area:   Online support,  distribution service  $($speech and data$)$,
  6. Medical area:   Telemedicine.



Security aspects


The security features in UMTS networks are based on the same principles as in GSM.  However,  some GSM security features have been removed,  replaced or expanded.

This has made

  1. the encryption algorithms more robust,
  2. the authentication algorithms more stringent,  and
  3. the subscriber confidentiality criteria tighter.


The main security standards adopted from GSM in UMTS are:

  1.  subscriber authentication,
  2.  confidentiality of the subscriber identity,
  3.  encryption of the radio interface.


In addition to these, other security measures have been observed in UMTS:

  1.  Mutual authentication to avoid the use of false base stations,
  2.  encryption of the connection between base station and associated control node,
  3.  encryption and authentication of security data during transmission,
  4.  mechanisms for updating the security features.
Compilation of security measures in UMTS


One can classify the above security measures according to the graph.  A distinction is made between security concepts for

  • the  »Network Access Security«  for each subscriber,
  • the  »User Domain Security «  – access to terminal equipment is ensured,
  • the  »Network Domain Security«  – a secure exchange of control data between nodes within the network domain is ensured,
  • the  »Application Domain Security«  – the secure exchange between applications of the subscriber terminals and the network providers is guaranteed.


The UMTS subscriber can see at any time which of these security measures are in operation and which of them are required for specific services.  In this context,  one speaks of  "Visibility and Configurability Security".


Exercises for the chapter


Exercise 4.1: Different Duplex Methods for UMTS

Exercise 4.2: UMTS Radio Channel Basics