Cellular Digital Packet Data Overview
Cellular Digital Packet Data Overview
Previous screen
Mobile Network Service
Nathan J. Muller
Payoff
In the wireless data market, major telephone companies are implementing cellular digital
packet data (CDPD) service to meet the needs of a mobile work force. CDPD is an
appealing method of transporting data over cellular voice networks because it is flexible,
fast, available internationally, compatible with a vast installed base of computers, and has
security features not found in other cellular systems.
Introduction
Cellular digital packet data (CDPD) is a data-over-cellular standard for providing LAN-like
service over cellular voice networks.Cellular Digital Packet Data employs digital
modulation and signal processing techniques, but it is still an analog transmission. The
CDPD infrastructure employs existing cellular systems to access a backbone router
network that uses the Internet protocol (IP) to transport user data. Personal digital
assistants, palmtops, and laptops running applications that use IP can connect to the CDPD
service and gain access to other mobile computer users or to corporate computing
resources that rely on wireline connections.
Because CDPD leverages the existing $20 billion investment in the cellular
infrastructure, carriers can economically support data applications and avoid the cost of
implementing a completely new network, as most competing technologies would require.
Cellular Digital Packet Data also offers a transmission rate that is four times faster than
most competing wide area wireless services, which are limited to 4.8K b/s or lower.
CDPD Fundamentals
Unlike circuit-switched schemes, which use dialup modems to access the cellular network,
Cellular Digital Packet Data is a packet-switched technology that relies on wireless
modems to send data at a raw speed of 19.2K b/s. AlthoughCDPD piggybacks on top of
the cellular voice infrastructure, it does not suffer from the 3-KHz limit on voice
transmissions. Instead, it uses the entire 30-KHz radio frequency (RF) channel during idle
times between voice calls. Using the entire channel contributes to CDPD's faster and more
reliable data transmission.
Underlying Technologies
CDPD is in fact a blend of digital data transmission, radio technology, packetization,
channel hopping, and packet switching. This technology lets the cellular network carry the
1s and 0s of binary digital code more reliably than is usually possible over cellular voice
networks.
Packetization
Packetization divides the data into discrete packets of information before transmission. This
approach is commonly used in wide area and local computer networks. In addition to
addressing information, each packet includes information that allows the data to be
reassembled in the proper order at the receiving end and corrected if necessary.
Channel Hopping
Channel hopping automatically searches out idle channel times between cellular voice calls.
Packets of data select available cellular channels and go out in short bursts without
interfering with voice communications. Alternatively, cellular carriers may also dedicate
voice channels for CDPD traffic.
Packet Switching
Packet switching, using the Internet protocol (IP), accepts data packets from multiple users
at many different cell sites and routes them to the next appropriate router on the network.
· Exerting minimum impact on end systems; existing applications should operate with
little or no modification.
Note:
Estimated per-user prices are based on sample applications and usage
figures. All prices subject to change without prior notice.
· Efficiency. CDPD transmits both voice conversations and data messages using the
same cellular equipment. Using a single device, it is a versatile and efficient way to
communicate. The digital data does not disrupt or degrade voice traffic, and vice versa.
· Speed. Having a maximum channel speed of 19.2K b/s—a four-fold increase over
competing mobile radio technologies—CDPD is the fastest wireless technology
available on the WAN.
· Security. With encryption and authentication procedures built into the specification,
CDPD offers the more robust security than any other native wireless data transmission
method, preventing casual eavesdropping. As with wireline networks, users can also
customize their own end-to-end security.
· Flexibility. Because it uses existing cellular radio technology, CDPD units are capable
of transmitting data over both packet- and circuit-switched networks, allowing
applications to use the best method of communication.
· Reliability. Because CDPD uses existing equipment on the network (i.e.,routers), as
Previous screen well as time-tested protocols based on TCP/IP, the highest quality of wireless data
service is assured. CDPD also provides excellent penetration within buildings.
· Worldwide Reach. CDPD can be used in conjunction with existing cellular systems
around the world. These systems already serve 85% of the world's cellular users.
Because CDPD allows the network to operate more efficiently by providing digital
packet data over the voice network, carriers also realize maximum flexibility, simplified
operations and maintenance, and cost savings. Carriers can offer enhanced messaging
services such as multicast, cellular paging, and national short-text messaging. CDPD
allows portable access to a variety of information services.
In effect, CDPD extends client/server-based applications from the LAN
environment into the wireless arena. This extension provides nearly limitless possibilities
for future wireless data services.
Equipment Requirements
CDPD is not without its problems. Even though Cellular Digital Packet Data takes
advantage of the existing circuit cellular voice infrastructure to send data at up to 19.2K b/s,
existing cellular modems cannot be used on CDPD-based networks. Modems designed for
CDPD networks are still larger and more expensive than those designed for circuit cellular.
CDPD-only modems cost about $500; modems that handle both CDPD and circuit cellular
run about $1,000. When the cost of CDPD modems drops to the $200 range, expense will
no longer be a barrier. Also, carriers are considering subsidizing the cost of Cellular Digital
Packet Data modems, the way they currently do with cellular phones, when users sign up
for service.
Mobile-End Systems
Although the physical location of a mobile-end system, or mobile unit, may change as the
user's location changes, continuous network access is maintained. The Cellular Digital
Packet Data specification stipulates that there will be no changes to protocols above the
network layer of the seven-layer Open Systems Interconnection (OSI) model, so that
applications software will operate in the Cellular Digital Packet Data environment. At the
network sublayer and below, mobile units and backbone routers cooperate to allow the
equipment of mobile subscribers to move transparently from cell to cell, or roam from
network to network. This mobility is accomplished transparently to the network layer and
above.
OSI Protocols
The recommendations of the CDPD consortium were designed using the Open Systems
Interconnection reference model (see Exhibit 3). The model not only provides a structure to
the standardization process, it offers recommendations regarding protocols available for
use in the CDPD network.
· X.500 directory services are a standard for directory services recommended by the
ITU/ISO that operate across multiple networks used to convey E-mail. It allows users
to look up the E-mail addresses of other users they wish to communicate with.
Mobility Management
Traditionally, the network address of the end system has been used to determine the route
used to reach that end system. Cellular Digital Packet Data is unique in allowing mobile
units to roam freely, changing their subnetwork point of attachment at any time— even in
midsession.
To find the best route for transmitting data to an end system, CDPD mobility
management definitions describe the creation and maintenance of a location information
data base suitable for real-time discovery of mobile unit locations. Three network entities—
the mobile units, the home backbone router, and the serving backbone router—participate
in mobility management.
Mobile units are responsible for identifying their unique network equipment
identifiers (NEIs) or network layer addresses to the Cellular Digital Packet Data network.
As the mobile unit moves from cell to cell, it registers itself with the new serving backbone
router. Each NEI is permanently associated with a home backbone router. The serving
backbone router notifies the home backbone router of a mobile unit when it registers itself
in the new serving area. Mobility management makes use of two protocols: the Mobile
Network Registration Protocol and theMobile Network Location Protocol.
Mobile Network Registration Protocol
MNRP is the method mobile units use to identify themselves to the network. This
information is used to notify the network of the availability of one or more NEIs at a
mobile unit. The registration procedure includes the information required by the network
for authenticating the user's access rights.
The mobile network registration protocol (MNRP) is used whenever a mobile unit
is initially powered up and when the mobile unit roams from cell to cell. In either case, the
mobile unit automatically identifies itself to the backbone router so its location can be
known at all times.
Mobile Network Location Protocol
MNLP is the protocol communicated between the mobile serving function and mobile
home function of the backbone routers for the support of network layer mobility. Mobile
network location protocol (MNLP) uses the information exchanged in mobile network
registration protocol (MNRP) to facilitate the exchange of location and redirection
information between backbone routers, as well as the forwarding and routing of messages
to roaming mobile units.
Information Protection
Previous screen
To facilitate the widespread acceptance of Cellular Digital Packet Data by cellular service
providers, the specifications define methods for ensuring the security of customer
information, while still providing an open environment for mobile users. Cellular service
providers are legitimately concerned about protecting information about their subscriber
base from each other, yet the nature of the service dictates that carriers exchange
information with one another to provide subscribers with full mobility.
For example, when a user who is usually served by Carrier X in Chicago roams to
the Carrier Z service area in Boston, Carrier Z must be able to find out whether that user is
authorized to use the network. To do that, Carrier Z queries the Carrier X data base about
the user's access rights using the network equipment identifier. Carrier X provides a simple
yes or no response. The details concerning the identity of the user, types of service the user
has signed up for, rates being charged, and amount of network usage are all protected.
Transparent Operation
Complete mobility is one of the key goals of Cellular Digital Packet Data networks.
Because applications software must be able to operate over the network, the network itself
must make any required operational changes transparently.
For example, the mobile units must automatically identify themselves to the
network using the Mobile Network Registration Protocol protocol, which recognizes the
network addresses of mobile units whenever subscribers power on their computers or
move to a new cell.
Data sent to a mobile unit is always sent through its home backbone router -
another example of transparent operation. The home backbone router maintains an up-to-
date table of the locations of the mobile units it is responsible for, thus making it possible
to send connectionless data transmissions to a roaming mobile unit at any time. The home
backbone router sends the data to the current serving backbone router. This scheme ensures
that data reaches an end system regardless of its location, while keeping internal routing
table updates to a minimum.
A connectionless service is one in which a physical connection need not be
established in order to transmit data because the network is always available. In this
scheme, each block of data is treated independently and contains the full destination host
address. Each packet may traverse the network over a different path. A connection-oriented
service, on the other hand, requires a destination address in the first packet only.
Subsequent packets follow the path that has been established.
Registration Procedure
Before a mobile unit can begin transmission, it enters into a dialogue, called the registration
procedure, with the backbone router serving the area in which it is currently located. This
dialogue identifies the mobile unit's Open Systems Interconnection network layer address
to theCellular Digital Packet Data network. The serving backbone router tells the home
backbone router responsible for that mobile unit that it is requesting service. The home
backbone router authenticates the mobile unit, checking such things as the user's access
rights and billing status. The registration procedure must be performed whenever the
mobile unit is first powered on, or roams to a new serving backbone router.
Once the registration and authentication procedures are completed, the mobile unit
begins sending data. The mobile unit is now on what appears to be a LAN connecting all
such units operating within the cell of the telephone network. The LAN is really a single set
of transmit and receive frequencies shared by the mobile units that access this cellular LAN
using the digital sense multiple access technique.
The cells, or Digital Sense, Multiple Access LANs, are interconnected by the
backbone routers in much the same way that routers connect Ethernet or token ring LANs.
The serving backbone router examines the data sent by the mobile units, looking for the
destination address. By comparing the destination address with those in its tables, the
backbone router can send the data to the appropriate destination by the best path available
Previous screen (see Exhibit 4). The user can now log on to the portable computer, access shared services
such as CompuServe, or send information directly to other roaming mobile units. When
sending data from a mobile unit to other computers, the CDPD network must only ensure
that the user is allowed to transmit. Once the user is authenticated, data is sent in a manner
similar to the way it is sent in current LAN internetworks.
Redirect Procedure
The home backbone router knows the current location of the mobile unit because of the
registration procedure. When sending information to a mobile unit, the home backbone
router encapsulates it into frames using the ConnectionLess Network Protocol protocol and
sends them to the address of the current serving backbone router. Once the data arrives at
the serving backbone router, it is de-encapsulated into its original form to be sent to the
mobile unit. This method of handling data trans-missions at the home backbone router is
called the redirect procedure (see Exhibit 5).
Conclusion
Mobile users who are already committed to wireless data services are among the early
users of Cellular Digital Packet Data service. As the price of CDPD modems fall, coverage
increases, and more applications become optimized for CDPD, the technology will have
even wider appeal.
Cellular digital packet data networks are appealing because they offer seamless
nationwide availability; work with the vast installed base of computers, applications, and
data networks; and make use of existing private and public network infrastructures,
encompassing all products and user equipment. The ultimate success of CDPD is, of
course, closely tied to industry efforts to standardize its implementation. A universal
standard for cellular packet data would facilitate terminal capability, allow users to roam
between service areas, and simplify the introduction of wireless data services.
Author Biographies
Nathan J. Muller
Nathan J. Muller is an independent consultant in Huntsville AL, specializing in advanced
technology marketing and education. He has more than 22 years of industry experience and
has written extensively on many aspects of computers and communications. He is the
author of eight books and more than 500 technical articles. He has held numerous technical
and marketing positions with such companies as Control Data Corp.,Planning Research
Corp., Cable & Wireless Communications, ITT Telecom, and General DataComm, Inc.
He holds an MA in social and organizational behavior from George Washington
University.