A Frequency Hopping Algorithm for Cordless Telephone Systems

Similar documents
Interference Analysis of a Total Frequency Hopping GSM Cordless Telephony System 1

Revision of Lecture Eighteen

Monitoring for Handover from TDD to GSM

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

6.02 Fall 2012 Lecture #5

Algorithms for Interference Sensing in Optical CDMA Networks

GSM Frequency Planning with Band Segregation for the Broadcast Channel Carriers

PERFORMANCE AND EFFICIENCY EVALUATION OF CHANNEL ALLOCATION SCHEMES FOR HSCSD IN GSM

Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile Ad Hoc Networks

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

CDMA TECHNOLOGY. Brief Working of CDMA

Bluetooth voice and data performance in DS WLAN environment

Frequency Hopping Spread Spectrum PHY of the Wireless LAN Standard. Why Frequency Hopping?

The mathematics of RAID-6

EPL 657 Wireless Networks

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks

Deployment of Multi-layer TDMA Cellular Network with Distributed Coverage for Traffic Capacity Enhancement

Assessment of Cellular Planning Methods for GSM

How To Write A Hexadecimal Program

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Lecture 1. Introduction to Wireless Communications 1

CS263: Wireless Communications and Sensor Networks

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

Notes 11: List Decoding Folded Reed-Solomon Codes

Multiple Access Techniques

Factoring Algorithms

Linear Codes. Chapter Basics

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

Adaptive Equalization of binary encoded signals Using LMS Algorithm

An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel. Gou HOSOYA, Hideki YAGI, Toshiyasu MATSUSHIMA, and Shigeichi HIRASAWA

Dynamic Frequency Selection (DFS) and the 5GHz Unlicensed Band

Frequency Hopping for GSM Base Station Tests with Signal Generators SME

Positioning in GSM. Date: 14th March 2003

Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse

Functional-Repair-by-Transfer Regenerating Codes

Radio Resource Allocation in GSM/GPRS Networks

Inter-cell Interference Mitigation Reduction in LTE Using Frequency Reuse Scheme

Frequency Assignment in Mobile Phone Systems

A! Aalto University Comnet

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

CHAPTER 1 1 INTRODUCTION

White Paper: Microcells A Solution to the Data Traffic Growth in 3G Networks?

PART 5D TECHNICAL AND OPERATING CHARACTERISTICS OF MOBILE-SATELLITE SERVICES RECOMMENDATION ITU-R M.1188

Image Compression through DCT and Huffman Coding Technique

DAB + The additional audio codec in DAB

What is DECT? DECT stands for Digital Enhanced Cordless Telecommunications.

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Implementation of Mobile Measurement-based Frequency Planning in GSM

MOST error-correcting codes are designed for the equal

Mobile Communications TCS 455

Passive Discovery Algorithms

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3

Multiuser Communications in Wireless Networks

MASTER'S THESIS. Improved Power Control for GSM/EDGE

Network Security. Chapter 6 Random Number Generation. Prof. Dr.-Ing. Georg Carle

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

Planning of UMTS Cellular Networks for Data Services Based on HSDPA

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2

Adaptive Linear Programming Decoding

Factoring & Primality

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

Non-Data Aided Carrier Offset Compensation for SDR Implementation

Figure 1: cellular system architecture

NEW applications of wireless multi-hop networks, such

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

COMPATIBILITY STUDY FOR UMTS OPERATING WITHIN THE GSM 900 AND GSM 1800 FREQUENCY BANDS

Seamless Congestion Control over Wired and Wireless IEEE Networks

Introductory Concepts

GSM System. Global System for Mobile Communications

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

How To Understand And Understand The Power Of A Cdma/Ds System

Performance of networks containing both MaxNet and SumNet links

IN current film media, the increase in areal density has

Channel assignment for GSM half-rate and full-rate traffic

Yu.M. Tulyakov, D.Ye. Shakarov, A.A. Kalashnikov. Keywords: Data broadcasting, cellular mobile systems, WCDMA, GSM.

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Possible Applications

Performance Issues of TCP and MPEG-4 4 over UMTS

1 Introduction to mobile telecommunications

College of information technology Department of software

Load Balancing in MapReduce Based on Scalable Cardinality Estimates

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

SECRET sharing schemes were introduced by Blakley [5]

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

GSM GSM TECHNICAL May 1996 SPECIFICATION Version 5.0.0

Transcription:

A Frequency Hopping Algorithm for Cordless Telephone Systems André Noll Barreto, Jürgen Deißner and Gerhard Fettweis Dresden University of Technology Chair for Mobile Communication Systems, Dresden, Germany <noll,deissner,fettweis>@ifn.et-tu-dresden.de In this paper a novel frequency hopping algorithm is introduced, which is tailored for use in a Cordless Telephone System (CTS) that relies on total frequency hopping to use the same frequency band as a GSM system.the algorithm was designed with the goal of minimising the interference between different CTS-units and between the CTS and the overlay GSM network, taking into account standard GSM interleaving and coding procedures. It is part of the GSM- CTS implementation assumption for standardisation at ETSI. The proposed algorithm is described and simulation results are shown to prove its optimal characteristics. - Introduction The introduction of cellular mobile communication systems has enabled a great degree of mobility in telecommunication services, and among the different standards, GSM and GSM8 are being employed in many countries all over the world. Nevertheless, a typical user spends a reasonable amount of time at fixed locations, such as at home or in the office, and it is then usual to use the conventional fixed line network, which provides lower charges and better quality. Furthermore, indoor environments often lack the adequate radio coverage for a successful connection to a PLMN. It would be desirable to have a single terminal which is able to connect to both a PLMN and the fixed network. A dual-mode terminal, such as a GSM/DECT mobile terminal, provides this feature, but a simpler solution is to develop a GSM mobile terminal that can also be used as a cordless phone based on the GSM air interface. This would require just a slight modification in a GSM hand-held set, as well as a CTS-Fixed Part, which is connected to the fixed network[]. In order to comply with regulations and to avoid hardware modifications, the same frequency band as in a GSM PLMN must be used. However, the location of the CTSs are defined by the users and cannot be controlled by the PLMN operator, which prevents their inclusion in the operator s frequency planning. This implies that a way to minimise the interference between the CTS units and the GSM overlay network has to be found. One way to implement the CTSs without causing a significant interference in the GSM network is to employ slow frequency hopping [,], preferably over a large number of frequencies, so that in each burst a different radio channel is affected, and eventual collisions can be resolved by interleaving and decoding. It is also envisaged to assign to each. This work was supported by Alcatel user a different FH sequence, which can be used for authentication. Due to this fact, and to eliminate the possibility that a PLMN user and a CTS employ the same FH sequence, a new FH algorithm is required, even though frequency hopping is already standardised for GSM []. Additionally, the frequency hopping code developed for this application can also be employed for the fast deployment of picocells, which are to be used for serving hotspots within an overlaying macrocell, without requiring frequency planning. - Requirements for the FH Algorithms Complying to the demands of a CTS, some characteristics are desired for the frequency hopping code. These are discussed in this section. The code size L is the number of different codewords that can be generated by a particular algorithm. Since in the CTS proposal the FH sequence is also a part of the authentication process, a large number of different sequences must be available in order to prevent unauthorised mobiles from having access granted. Moreover, having in mind that the code and location of different CTSs cannot be planned, a large code size prevents two neighbour CTSs from sharing the same FH sequence. For those reasons, the code size should be as large as possible. Long sequences are required due to their use for authentication, since short sequences can be easily scanned and reconstructed by a defrauder. As a reference, we consider that a period at least as long as the one obtained with the standard GSM frequency hopping code (T = 88) is desired. The alphabet size N, i.e., the number of different frequencies, should be flexible, since the number of available frequencies may depend on regulatory issues and on agreements with different network operators. In a possible implementation the number of available frequencies for frequency hopping changes depending on the interference levels on each channel, what would also require a flexible alphabet size. Usually, the most important figure of merit of FH codes is the distribution of the Hamming correlation [], but for our application an analysis has to be made which takes into account the interference between codes with possibly different periods (e.g., between a CTS and the PLMN), in which case this concept no longer applies. A more adequate and similar figure of merit is the hit probability, i.e, the probability that two FH sequences share the same frequency in a given burst. If the transmitter hops over N

frequencies, it can be expected that the mean value of the hit probability will be equal to /N, considering every possible pair of sequences at every possible relative delay. However, this may not be the case for every pair of sequences, and some pairs may have a much larger hit probability. Our goal is to design FH codes with a low variance in the hit probability distribution, and hence with few pairs of sequences showing a large hit probability. An optimal algorithm satisfies the following condition for every pair of sequences. T N P hit ------------------ T Furthermore, if we consider the application of frequency hopping in GSM, we must also take interleaving and coding into account. If many hits occur within the interleaving depth, the decoder will probably not be able to correct the errors, and therefore a code in which the hits are more evenly distributed in time is preferred. We assume that up to hits within an interleaving depth of 8 can be corrected [7]. It should be reminded that, in accordance to the proposed application, the appropriate code should have good hit probability characteristics in the following three different interference scenarios.. The hits between two sequences generated by different CTSs.. The hits between a sequence generated by a CTS and a PLMN user not using frequency hopping.. The hits between a sequence generated by a CTS and a PLMN user using frequency hopping. The second and the third scenarios can be considered more important, since one major requirement is that the PLMN services should be barely disturbed by the introduction of the CTSs. Besides satisfying all the above requirements, the frequency hopping algorithm should be easy to implement. - The Frequency Hopping Algorithm Many different frequency hopping codes have been suggested in the literature [-], but none of them satisfies all the above requirements. The codes presented in [,8-,] have all a short period, at the same order of magnitude as the alphabet size, whereas the codes introduced in [,] have rather small code sizes. The codes suggested by Kumar [7] and Vajda [] can have a long period and a large code size, but have an inflexible alphabet size and are relatively difficult to implement. Moreover, as we can see in the next section, the Kumar code does not perform very well when the interference between the CTSs and the PLMN is investigated. We have taken as a basis for our algorithm the Lempel- Greenberger code[]. It is a code with optimal Hamming correlation properties and long period, but it has three () major drawbacks. It has an inflexible alphabet size, which must be the power of a prime number; a limited code size, equal to the alphabet size; and long runs of the same frequency tend to occur, which is unfavourable for the second interference scenario, besides not providing sufficient frequency diversity. In this section we first describe this code and then introduce novel improvements.. Lempel-Greenberger Frequency Hopping Algorithm Let {s n } denote an m-sequence (i.e., a maximum length linear feedback shift register sequence), of period T LG = p J - over GF(p), where J is the number of shiftregister elements, and let b(n) be a K-tuple of consecutive elements {s n, s n -,..., s n-k- }. Now let v be any K- tuple over GF(p) and f(x) be a one-to-one mapping of a K- tuple over GF(p) into a set of p K different frequencies. Assuming that each sequence is defined by a different vector v, there are L LG = p K different frequency sequences defined by LG(n) =b(n) v f({b (n) v, b (n) v...,b K- (n) v K- }) (), where represents addition modulo p. This code can be proven to be optimal in terms of its Hamming correlation properties [], or equivalently, in terms of the hit probability distribution, as defined by equation ().. Modified Lempel-Greenberger Algorithm In order to increase the number of possible sequences, we first introduce a small modification, by allowing the K- tuples b (n) to be formed of any K different shift-register elements at any order. Now, apart from v, we assign to each different sequence a K-tuple a, describing which elements of the shift-register form the K-tuple b (n), so that b' ( n) = s n a, s n a,, s n ak () where a i <J and a i a j for i j. As in equation (), the sequence is formed by LG (n) =b (n) v. By this modification, L LG K! J K = p different K sequences can be generated, not counting delayed versions of the same sequence. The optimality in terms of the Hamming correlation can no longer be guaranteed, but its characteristics are nevertheless very good. The generation of the modified Lempel-Greenberger algorithm can be better visualised in Fig., with p =, J = 7, K = and a = {,,7}.

the above values is T our code = 897. v v f ( ) v LG (n) Generation of modified LG codeword n LG (n) l 7 b n b n - b n - 7 b n - b n - b n - b n - Mapping into an internal codeword c l c c =c c 7 =c c c Fig. - Implementation of a modified Lempel-Greenberger algorithm. Our algorithm (LG/NR) In order to eliminate the problem of runs of same frequencies, the concatenation of a Lempel-Greenberger with a Reed-Solomon code was proposed in [], but the difficulties with a small code size and inflexible alphabet size still remain. In our proposal, the modified Lempel-Greenberger code is block concatenated with an internal code, in whose codewords each frequency appears exactly once, and there are no restrictions on the alphabet size. Each internal codeword is constructed upon a base sequence of N nonrepeating integer elements c ={c, c,...,c N - }, c i <N and c i c j for i j. Different internal code sequences can be generated by the modulo N addition over the base sequence, i.e., an internal code sequence c l is given by : c l = {c l, c l,..., c N - l} (), where represents addition modulo N. There are therefore N different internal code sequences for each base sequence. We choose a modified Lempel-Greenberger code based on a binary shift-register, with K satisfying : K = log N In case the number of different internal sequences is smaller than the number of external code elements (i.e., K >N), some internal sequences are generated by two different outer code elements, and hence would occur twice as often as the other sequences. In order to prevent that, we add the count of register shifts to the external code element before mapping into an internal sequence. An example of the generation of the concatenated sequence x(k) can be seen in Fig., with c={,,,,,}, N =. Different sequences are characterised by different sets of a, v and c, and hence the number of different sequences is L our code = L LG (N-)!. For example, with J = 7 shift-register elements, N = 7 frequencies, and, according to (), K = there are L our code, different sequences, which is much more than for the codes found in the literature. The period of these sequences is T our code = NT LG, which for () x(k) Fig. - Example of code concatenation In the following sections this code will be referred as LG/NR, which stands for the concatenation of a Lempel- Greenberger with a non-repeating code. - Simulation Results As shown in the previous section, our algorithm has the appropriate characteristics in terms of period, code size and alphabet size. Since an analytical solution for the hit probability characteristics was not feasible, simulations were performed, and the results are shown in this section. As a reference we have compared our code with different existing codes, namely: the Lempel-Greenberger code with extended code size, i.e, including the modification introduced in the previous section; the Kumar code; and a modified version of the standard GSM code. In Fig. and Fig. the hit probability distribution of the different codes is displayed. For each code, different sequence pairs were correlated and for each pair the hit probability was obtained. The alphabet size is for every code, except for the Kumar code, for which it is equal to due to code constraints. The graphs show the corresponding histogram. It should be noticed that we want to minimise the occurrence of pairs of sequences with a high hit probability, and hence an ideal code would have a very concentrated hit probability distribution.in Fig. we can see the results corresponding to the interference between two CTSs, i.e., the hit probability distribution between two sequences generated by the same algorithm. It can be seen that the modified GSM algorithm has the worst performance, and the same behaviour can be observed in the standard GSM algorithm, which is probably due to some constraints imposed by synchronisation on the code design.. This modification has to be introduced in order to achieve a larger code size, which is limited to in the standard GSM code[]. It consists in generating different sequences with different RNTABLES. The RNTABLE is a look-up table defined in the GSM standards, and it represents a one-to-one mapping of integers between and into 7 bits. In the GSM standards this table is constant and the same for every user.

On the other hand, the modified Lempel-Greenberger has nearly optimal correlation properties, which means that the modifications did not alter to a great extent its properties. Both the Kumar and the LG/NR code have very good characteristics, similar to the ones expected from random sequences.. x Distribution......8 We see in Fig. the simulation results for the interference between a CTS sequence and a user without frequency hopping. As we can see, the Lempel-Greenberger algoa) mod. GSM x mod. GSM 7 x Distribution....8....8 c) Kumar x Kumar d) LG/NR x LG/NR Fig. - Histogram - Interference between two CTSs Fig. shows the results related to the interference between a CTS and a PLMN user without frequency hopping, i.e., it simply represents the probability of occurrence of any particular frequency. All codes, except the Kumar, have a good performance, but our code outperforms all the other. The results for the Kumar code indicate that some frequencies occur more often than the others. An analysis considering a PLMN with frequency hopping shows similar results, since in GSM networks frequency hopping is usually made over a small set of frequencies. As already mentioned in section, the effect of interleaving and coding should also be investigated, and we have considered an appropriate measure to be the number of hits occurring within 8 consecutive bursts, which is the interleaving depth of a GSM traffic channel. Assuming that the decoder is able to recover the signal if at least of these 8 bursts are received correctly [7], and that a hit can impair the correct reception of a burst, we shall consider the figure of merit to be the probability that more than hits occur within any window of 8 consecutive bursts. The results can be seen in Fig. and Fig., where besides the above cited codes, the results for a random code have also been displayed..9.8.7...... 8 7 Distribution b) mod. LG x mod. LG 9 x Distribution....8....8 7 x Distribution a) mod. GSM x no FH......7.8....8.......8 c) Kumar x no FH d)lg/nr x no FH Fig. - Histogram - Interference between a CTS and a PLMN user with no Frequency Hopping In Fig. the results obtained for two CTS sequences are shown. The standard GSM code was also simulated, and it has a much worse performance than the others, since due to the small code size, some sequences can be repeated. This justifies the need for a large code size and the introduction of a modified GSM code. All the other codes have performances similar to that obtained by a random code. Probability 8 x Distribution.... e Fig. - Probability of at least n hits in 8 consecutive bursts - Interference between two CTSs...7...... Distribution a) LG x no FH Distribution....8 Cumulative Probability of n hits in 8 consecutive bursts Random mod. GSM LG LGNR Kumar GSM e 8 7 Number of hits in 8 consecutive bursts

rithm performs rather badly by this criterion, since runs of the same frequency tend to happen. The Kumar code has a performance slightly worse than that obtained by a random code, what was expected from the results shown in Fig.. The modified GSM algorithm has good properties at this aspect, similar to the ones of a random code,but the LG/NR has by far the best results, since it was designed in a way that each frequency occurs no more than twice within the interleaving depth D(if D L + ). Probability.... e e 8 7 Number of hits in 8 consecutive bursts Fig. - Probability of at least n hits in 8 consecutive bursts - Interference between a CTS and a PLMN user without frequency hopping Simulation studies considering the performance of the different algorithms in a mobile communications system have also been undertaken. Initial results show that a lower Frame Erasure Rate can be obtained using the LG/NR algorithm instead of the GSM algorithm, and further information can be obtained from another study, yet to be published [8]. - Conclusion We have developed a new frequency hopping code suited for application in a Cordless Telephone System. This code satisfies all the requirements for the use in a CTS, such as long period, large code size and flexible alphabet size. Moreover, simulation results show that it has an outstanding performance in terms of hit probability properties, specially when considering the interference from a CTS with a PLMN user. These characteristics make it not just a good choice for employment in CTSs, but also for deploying PLMN picocells under existing macrocells, without requiring frequency planning. - References Cumulative Probability of n hits in 8 consecutive bursts Random mod. GSM LG LGNR Kumar [] Tdoc SMG 9/97 : Digital cellular telecommunications system (Phase +); GSM Cordless Telephony System (CTS), Phase ; Service Description (GSM.XX), ETSI 997 [] Tdoc SMG WPB /97 : Low interference GSM- Cordless telephony system description, ETSI 997 [] M.I. Silventoinen, M. Kuusela and P.A. Ranta, Analysis of a New Channel access Method for Home Base Statiom, ICUPC 9 [] ETS 77 : European Digital Cellular telecommunications System (Phase ); Radio Transmission and Reception (GSM.), ETSI 99 [] A. Lempel and H. Greenberger, Families of sequences with optimal Hamming correlation properties, IEEE Trans. Inf. Theory, Jan. 97, pp. 9-9 [] F.M. Assis, Hit probability between frequency hopping sequences generated by Reed-Solomon and Hermitian codes, Electronics Letters, Jul. 99, pp. 9-9 [7] P.V. Kumar, Frequency-hopping code sequence designs having large linear span, IEEE Trans. Inform. Theory, Jan 988, pp - [8] H.D. Lüke, Large families of polynomial phase sequences with low correlation, European Trans. on Telecomm., May-June 99, pp -8 [9] S.V. Marik, E.L. Titlebaum, A class of frequency hop codes with nearly ideal characteristics for use in multiple access spread-spectrum communications and radar and sonar systems, IEEE Trans. on Comm., Sep. 99, pp. -7 []R.M. Mersereau, T.S. Seay, Multiple access frequency hopping patterns with low ambiguity, IEEE Trans. on Aerospace and Electronic Systems, July 98, pp. 7-78 []A.A. Shaar, P.A.Davies, Prime sequences : quasioptimal sequences for OR channel code division multiplexing, Electronic Letters, 98, pp. 88-89 []A.A. Shaar, P.A.Davies, A survey of one-coincidence sequence sets for frequency-hopped spread spectrum systems, IEE Proc. - Part F : Commun., Radar and Signal Processing, Dec 98, pp. 79-7 []E.L. Titlebaum, Time frequency hop signals, Part I : Coding based upon the theory of linear congruencies, IEEE Trans. Aerospace and Electronic Systems, July 98, pp. 9- []I. Vajda, Code sequences for frequency-hopping multiple-access systems, IEEE Trans. on Commun., Oct. 99, pp. - []L.D. Wronski, R. Hossain and A.Albicki, Extended hyperbolic congruential frequency hop code : Generation and bounds for cross- and auto- ambiguity function, IEEE Trans. on Commun., March 99, pp. - []N. Burger, The design of frequency hopping patterns for multiple-access communications, M.S. Thesis, University of Illinois at Urbana-Champaign, Jan. 99 [7]M.Mouly and M.B. Pautet, The GSM system for mobile communications, 99 [8]J.Deissner, A.N. Barreto, U. Barth and G. Fettweis, Interference analysis of a total frequency-hopping GSM Cordless Telephony System, To be presented at PIMRC 98