The Importance Of Cdma Computer Science Essay

Published:

CDMA stands for Code-Division Multiple Access,a technology which is also called digital cellular technology which uses technique of Spread Spectrum. CDMA has a special feature that it don't assign each user with specific frequency instead full available spectrum utilization is done by every existing channel.Coding is done following pseudo-random digital sequence. Better capacity for voice and data communications than other commercial mobile technologies, allowing more subscribers to connect at any given time.

CDMA consistently provides better capacity for voice and data communications than other commercial mobile technologies, allowing more subscribers to connect at any given time, and it is the common platform on which 3G technologies are built.

One of the terms you'll hear in conjunction with CDMA is "Soft Handoff". A handoff occurs in any cellular system when your call switches from one cell site to another as you travel. In all other technologies, this handoff occurs when the network informs your phone of the new channel to which it must switch. The phone then stops receiving and transmitting on the old channel, and commences transmitting and receiving on the new channel. It goes without saying that this is known as a "Hard Handoff".

IMPORTANCE OF CDMA

Lady using a tablet
Lady using a tablet

Professional

Essay Writers

Lady Using Tablet

Get your grade
or your money back

using our Essay Writing Service!

Essay Writing Service

CDMA changes the nature of the subscriber station from a predominately analog device to a predominately digital device. In CDMA technology multiple users can occupy the same frequency band ensuring frequency reusability. This is the reason why CDMA is the technology of choice for next generation digital wireless communications products and services. Some of the major importances of CDMA technologies are:

It is very useful for military purpose. Since, these signals are transmitted at different frequencies at that too in a very large bandwidth, so it becomes hard to either interpret or jam or cause interference to the transmission.

CDMA is more secured than other wireless communication service such as GSM. This is because CDMA uses a pseudo random code, which is integrated with the data and then removed at the receiver end to recollect the original data.

CDMA signals provide greatest coverage in the wireless industry. This requires to built fewer cell sites reducing expenses both on providers and customer side.

Because of CDMA's soft handoff policy, there are fewer call drops. This is because at any instant of time two or three cell are monitoring a call, and passing calls between cells is sharply in case of CDMA.

3……..

Here's how the three most popular technologies establish channels:

FDMA (Frequency Division Multiplex Access)

each user on a different frequency

a channel is a frequency

TDMA (Time Division Multiplex Access)

each user on a different window period in time ("time slot")

a channel is a specific time slot on a specific frequency

CDMA (Code Division Multiplex Access)

each user uses the same frequency all the time, but mixed with different distinguishing code patterns

a channel is a unique set of code patterns

Frequency

Time

Power

Frequency

Time

Power

Frequency

Time

Power

FDMA

TDMA

CDMA

Introduction to Spread Spectrum Communications

Three Types of Spread Spectrum Communications

There are three ways to spread the bandwidth of the signal:

Frequency hopping.

Time hopping

Direct sequence.

The standard chosen is CDMA and it is a form of Direct Sequence Spread Spectrum communications.

The technology which CDMA uses is Direct Sequence Spread Spectrum.

Direct sequence Spread Spectrum:In this coding of digital data is done at much hgher frequency.Since the code generated is pseudo-randomly, the receiver knows how to generate the same code, and correlates the received signal with that code to extract the data.

Direct Sequence Spread Spectrum

Since CDMA is a follower of Direct Sequence Spread Spectrum system. The whple System works on 64 kbit/sec digital signals. The signals can be easily present in the digitised voice, ISDN channels, modem data, etc.

.

Direct Sequence Spread Spectrum System

Lady using a tablet
Lady using a tablet

Comprehensive

Writing Services

Lady Using Tablet

Plagiarism-free
Always on Time

Marked to Standard

Order Now

Explanation of Transmission:

Steps of Signal transmission

1. A code is generatedwhich is called pseudo-random,which is uncommon for all channels and for each next coming connection.

2. The pseudo-random code is modulated by Information data.

3. A carrier is resulted by a signal modulation.

4. The amplification and broadcasting is done of modulated carrier.

Steps of Signal reception:

1. Receiving and amplification of The carrier .

2. For recovering of the spread digital signal mixing of the received signal with a local carrier id done.

3. Generation of pseudo-random code .

4.Aquiring of the received code by the receiver and after the locking its own code to the recived code is done by phase..

5. By extracting the Information data the correalation of the received signal is done with the generated code,.

…………………………………………………………………………………………

The technique followed by Direct Sequence Spread Spectrum is

QPSK (Quadrature Phase Shift Keying) Phase modulation algorithm.

Frequency modulation is having one version of it is Phase modulation in which modulation of carrier wave is done in terms of the phase for the purpose of encoding digital information of every bits after every phase change.

"PSK" stands for Phased Shift Keying .

It is aform of phase modulation which is achieved by using states of discrete number.

QPSK stands for PSK with 4 states.

The "Quad" in QPSK refers to four phases. Since a carrier is sent in QPSK: 45, 135, 225, and 315 degrees.

QPSK Encoding

Since QPSK is having 4 possible states,so coding can be done using 2 bits only .

Phase

Data

45 degrees

Binary 00

135 degrees

Binary 01

225 degrees

Binary 11

315 degrees

Binary 10

. QPSK uses four points on the constellation diagram, equispaced around a circle which is shown with grey coding.This shows that while maintaining bandwith QPSK can provide double the data rate comompared to a BPSK system .

Since there is an ambiguity problem with at the receiver side thus QPSK is more widely used

Conceptual transmitter structure for QPSK

Receiver structure for QPSK

……………………………………………

This figure shows an overview of a CDMA Technology.

MAP

DMS-MTX

BTS

T1 or E1s

MTSO

T1s

BSM

BSC

Hardware:

Twisted pair - copper

Coaxial cable

Fiber optic cable

Air interface (radio signals)

Mobile Telephone Exchange (MTX) provides call processing functions for AMPS/TDMA/CDPD/CDMA cellular systems

Base Station Manager (BSM) provides a Graphical User Interface (GUI) for operations, administration and maintenance of the BSC, BTS and itself

Base Station Controller (BSC) provides data routing, voice coding

and some hand-off functions

Base Station Transceiver Subsystem (BTS) provides the RF link

to the subscriber

MTX, BSC and BSM are identical for 800 and 1900 MHz products

……………………………………………..

.SECURITY ISSUES

Since CDMA Sysem is wireless communication channel and data is transferred through wireless channels so there are a lot of chances of eavesdropping .It is generally said that CDMA is safe from eavesdropping but the ground reality is it is possible..So for that purpose

Since today's service providers are realising the importance of security so it is possible that in near future switch can be used for the purpose of security.

Security as well As Authentication in CDMA

In IS-41 standard authentication for CDMA access has been defined .

, For that purpose,Generation of intermediate keys called "Shared Secret Data (SSD)" is done.

In IS-41There are two guidelines

1.SSD-A for the purpose of authentication signature.(64 bits)

2. SSD-B for the purpose of cryptographic key generation.(64 bits)

Keys generated from SSD-B:

The CMEA key (64 bits)

The Voice Privacy Mask (520 bits)

The DataKey (32 bits)

3.4 Authentication Signatures

Allowing a mobile phone to access the network is possible only when the phone had faced a challenge or master key with the help of key present in it's own , based on the SSD-A (IS-41) , and it also contains the special algorithm called CAVE for the purpose of calculating signature.

Security Concerns in CDMA

Lady using a tablet
Lady using a tablet

This Essay is

a Student's Work

Lady Using Tablet

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Examples of our work

Algorithms for the purpose of encryption and authentication are used by CDMA

algorithm for authentication: CAVE

algorithm for encryption: CMEA

algorithm for privacy and integrity of data: ORYX

Other Securities:

Core Network Security

Management Security

………………………………………………………………………..

Applications

Type of locality and the proximity of the nearest site decides usage of type of Technology.

More important than the type of building however is the proximity of the nearest site

CDMA shows its importance when we are out in the countryside and only few sites are there covering large masses of land. Here CDMA magic is shown ,by providing of extremely stable audio with few frame errors with less mess up or you can say negligible. This is because Channel Pollution is almost non-existent in these situations.

This CDMA technology is also used in locality of sparsely populated areas.

CDMA systems can survive open regions just outside densely populated areas, where signals from different sites are also coming from the nearby densely populated areas, but there should be no dominant signal strength.

CDMA is used at high grounds where TDMA fails .

Malls with glass roofs will generally provide better service than fully enclosed ones. More important than the type of building however is the proximity of the nearest site. When a site is located just outside of a building it can penetrate just about any building material. When a site is much further away however, the signals have a much harder time of getting past the walls of a structure

Industries:

Private networks

TELCO bypass

Rural telephony

Utilities like electricity, oil, gas and water

Railroads and transportation

.Banks, hospitals, universities and corporations

.Videoconferencing

LAN/WAN/Internet connection

for ranging and radar.

Advantages of CDMA:

One of the main advantages of CDMA is that dropouts occur only when the phone

is at least twice as far from the base station. Thus it is used in the rural areas where GSM

cannot cover. Another advantage is its capacity; it has a very high spectral capacity that it

can accommodate more users per MHz of bandwidth. It uses a vocoder EVRC for noise

reduction where the background noise is reduced. This is exclusively available in CDMA

technology only.

Disadvantages of CDMA:

One major problem in CDMA technology is channel pollution, where signals

from too many cell sites are present in the subscriber's phone but none of them is

dominant. When this situation arises the quality of the audio degrades. Another

disadvantage in this technology when compared to GSM is the lack of international

roaming capabilities. The ability to upgrade or change to another handset is not easy with

this technology because the network service information for the phone is put in the actual

phone unlike GSM which uses SIM card for this. One another disadvantage is the limited

variety of the handset, because at present the major mobile companies use GSM

technology.

……………………………………….

Problems faces while implementation of CDMA technology

In Code Division Multiple Access (CDMA), each user is assigned a different

pseudorandom binary sequence that modulates the carrier, spreading the spectrum of the

waveform and giving each user a unique code pattern.

This technology is used in ultra-high-frequency (UHF) cellular telephone systems in the

800-MHz and 1.9-GHz bands.

Just because of this we can cover only 30% of the world network.

Conclusions

The CDMA technology is generally known as

powerful security during communication. However,

the communication data might be eavesdropped and

forged, because the mobile communication sends

data through wireless communication channel. So it

is essentially necessary to setup the entire system

securely. This paper analyzes the security hole and

proves a weak point of CDMA system. Based on the

results, we emphasize the necessity of security in

CDMA system. For the sake of this, we analyze the

IS-95 protocol and propose the monitor mechanism

of forward channel in call processing procedure. The

IS-95 and GSM only define the security features

between the mobile station and the base station.

The monitor equipment is divided into two parts

that are a logic circuit part and RF circuit part. The

logic circuits are MSM(Mobile Station Modem), Audio

PCM Codec, speaker, memory, PC(Personal

Computer), and UART. RF circuit, which transforms

CDMA signal into BASE BAND signal, are BBA, PLL,

AMP, and filter. We propose only the methodology of

the forward channel monitoring by modifying the

terminal S/W partially in CDMA terminal. We propose

S/W and H/W architecture for the call process of the

forward channel monitor and analyze the call process

procedure. The REX Operating System in equipment

terminal was used to monitor the CDMA system. If

we know the ESN and the MIN, we can eavesdrop

the CDMA data. We can easily know the ESN and

MIN value by HP8924C instrument.

We suggest the FCM protocol to monitor CDMA

system. This paper proves a weakness of CDMA

system using the FCM protocol. We also prove that

the BS and the MS are the same data in

communicating each other. We implement the test

instruments including the FCM protocol. In the

experiment of monitoring system based on the FCM

protocol, we can monitor an user communication

message by the monitoring environments. In the

future, based on the result, we will suggest a new

system architecture for the secure CDMA system

http://www.topbits.com/qpsk.html

http://www.sunwave.co.kr/data/en_prod1/1137412186_2.gif

http://www.sunwave.co.kr/data/en_prod1/1137412186_2.gif

http://www.google.co.in/search?hl=en&q=direct+sequence+spread+spectrum+ppt&meta=&aq=0&aqi=g10&aql=&oq=direct+sequence+spread+spectrum+&gs_rfai=

http://en.wikipedia.org/wiki/Phase-shift_keying

http://en.wikipedia.org/wiki/Cellular_network

http://images.google.co.in/images?um=1&hl=en&tbs=isch%3A1&sa=1&q=areas+using+Direct+sequence+spread+spectrum&aq=f&aqi=&aql=&oq=&gs_rfai=&start=0

http://www.bscitmumbai.blogspot.com